Package: squirrelmail
Version: 1.4.4-6
Severity: grave
Tags: security fixed-upstream sarge etch sid

[I've submitted this a couple of days ago but it never arrived in the
BTS for some reason]


A vulnerability has been discovered in the handling of the $_POST
variable in a specific part of SquirrelMail. This potentially allows for
setting other people's preferences and possibly reading them, writing
files at any location writable for www-data and cross site scripting.

Upstream is preparing a new release that addresses this issue, which is
known as CAN-2005-2095.

A patch from upstream has been applied and is awaiting review by Jeroen
and the secuirty team. Possibly the patch has to be changed to
accomodate Debian specific needs (in terms of the number of changes).


Thijs

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to