Red Hat alert RHSA-2005:099-01 (Squirrelmail)
| From: | bugzilla@redhat.com | |
| To: | enterprise-watch-list@redhat.com | |
| Subject: | [RHSA-2005:099-01] Moderate: squirrelmail security update | |
| Date: | Tue, 15 Feb 2005 05:26 -0500 |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: squirrelmail security update Advisory ID: RHSA-2005:099-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-099.html Issue date: 2005-02-15 Updated on: 2005-02-15 Product: Red Hat Enterprise Linux CVE Names: CAN-2005-0075 CAN-2005-0103 CAN-2005-0104 - --------------------------------------------------------------------- 1. Summary: An updated Squirrelmail package that fixes several security issues is now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - noarch Red Hat Enterprise Linux Desktop version 4 - noarch Red Hat Enterprise Linux ES version 4 - noarch Red Hat Enterprise Linux WS version 4 - noarch 3. Problem description: SquirrelMail is a standards-based webmail package written in PHP4. Jimmy Conner discovered a missing variable initialization in Squirrelmail. This flaw could allow potential insecure file inclusions on servers where the PHP setting "register_globals" is set to "On". This is not a default or recommended setting. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0075 to this issue. A URL sanitisation bug was found in Squirrelmail. This flaw could allow a cross site scripting attack when loading the URL for the sidebar. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0103 to this issue. A missing variable initialization bug was found in Squirrelmail. This flaw could allow a cross site scripting attack. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0104 to this issue. Users of Squirrelmail are advised to upgrade to this updated package, which contains backported patches to correct these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/): 145387 - CAN-2005-0075 Arbitrary code injection in Squirrelmail 145967 - CAN-2005-0103 Multiple issues in squirrelmail (CAN-2005-0104) 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/squir... 67b27d7b6cf0638bc11ebf95f7b3f7f8 squirrelmail-1.4.3a-9.EL4.src.rpm noarch: 37baa8ae8e06f758db9f3026edb96a29 squirrelmail-1.4.3a-9.EL4.noarch.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/... 67b27d7b6cf0638bc11ebf95f7b3f7f8 squirrelmail-1.4.3a-9.EL4.src.rpm noarch: 37baa8ae8e06f758db9f3026edb96a29 squirrelmail-1.4.3a-9.EL4.noarch.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/squir... 67b27d7b6cf0638bc11ebf95f7b3f7f8 squirrelmail-1.4.3a-9.EL4.src.rpm noarch: 37baa8ae8e06f758db9f3026edb96a29 squirrelmail-1.4.3a-9.EL4.noarch.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/squir... 67b27d7b6cf0638bc11ebf95f7b3f7f8 squirrelmail-1.4.3a-9.EL4.src.rpm noarch: 37baa8ae8e06f758db9f3026edb96a29 squirrelmail-1.4.3a-9.EL4.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://www.squirrelmail.org/security/issue/2005-01-20 http://www.squirrelmail.org/security/issue/2005-01-19 http://www.squirrelmail.org/security/issue/2005-01-14 http://www.php.net/register_globals http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0075 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0103 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0104 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2005 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFCEc5lXlSAg2UNWIIRAgCOAJ4qeK9gQ4B3x5mngBMkSBBMclBeMgCgrdYm fPYXx2Eq0pcBQT5NLuY5yS0= =fP2W -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-...