Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the squirrelmail packages
Detailed Explanation for this Vulnerability Assessment
An updated SquirrelMail package that fixes a cross-site scripting
vulnerability is now available.
SquirrelMail is a webmail package written in PHP.
A cross-site scripting bug has been found in SquirrelMail. This issue
could permit a possible hacker to send a mail with a carefully crafted header,
which could result in causing the victim's machine to execute a malicious
script. The Common Vulnerabilities and Exposures project has assigned the
name CVE-2004-1036 to this issue.
Additionally, the following issues have been addressed:
- updated splash screens
- HIGASHIYAMA Masato's patch to improve Japanese support
- real 1.4.3a tarball
- config_local.php and default_pref in /etc/squirrelmail/ to match upstream
Please note that it is possible that upgrading to this package may remove
your SquirrelMail configuration files due to a bug in the RPM package.
Upgrading will prevent this from happening in the future.
Users of SquirrelMail are advised to upgrade to this updated package which
contains a patched version of SquirrelMail version 1.43a and is not
vulnerable to these issues.
Solution : http://rhn.redhat.com/errata/RHSA-2004-654.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|SHORETEL IP110 VOIP Silver Phone Scratches 1x-Base missing tab Lot of 11x
|Avaya 9611G Black VoIP Phone
|Obihai OBi110 Voice Service Bridge and VoIP Telephone Adapter
|LINKSYS VoIP VOICE BROADBAND ROUTER>RTP 300-VD 4 PORT + 2 PHONE PORTS>EX. COND.
No Discussions have been posted on this vulnerability.