Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.70102
Categoría:Mandrake Local Security Checks
Título:Mandriva Security Advisory MDVSA-2011:123 (squirrelmail)
Resumen:NOSUMMARY
Descripción:Description:
The remote host is missing an update to squirrelmail
announced via advisory MDVSA-2011:123.

Multiple vulnerabilities has been discovered and corrected in
squirrelmail:

functions/page_header.php in SquirrelMail 1.4.21 and earlier does not
prevent page rendering inside a frame in a third-party HTML document,
which makes it easier for remote attackers to conduct clickjacking
attacks via a crafted web site (CVE-2010-4554).

Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail
1.4.21 and earlier allow remote attackers to inject arbitrary
web script or HTML via vectors involving (1) drop-down selection
lists, (2) the > (greater than) character in the SquirrelSpell
spellchecking plugin, and (3) errors associated with the Index Order
(aka options_order) page (CVE-2010-4555).

Cross-site scripting (XSS) vulnerability in functions/mime.php in
SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary
web script or HTML via a crafted STYLE element in an e-mail message
(CVE-2011-2023).

CRLF injection vulnerability in SquirrelMail 1.4.21 and earlier
allows remote attackers to modify or add preference values via a \n
(newline) character, a different vulnerability than CVE-2010-4555
(CVE-2011-2752).

Multiple cross-site request forgery (CSRF) vulnerabilities in
SquirrelMail 1.4.21 and earlier allow remote attackers to hijack the
authentication of unspecified victims via vectors involving (1) the
empty trash implementation and (2) the Index Order (aka options_order)
page, a different issue than CVE-2010-4555 (CVE-2011-2753).

The updated packages have been upgraded to the 1.4.22 version which
is not vulnerable to these issues.

Affected: Corporate 4.0, Enterprise Server 5.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2011:123

Risk factor : High

CVSS Score:
6.8

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-4554
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
Debian Security Information: DSA-2291 (Google Search)
http://www.debian.org/security/2011/dsa-2291
http://www.mandriva.com/security/advisories?name=MDVSA-2011:123
RedHat Security Advisories: RHSA-2012:0103
http://rhn.redhat.com/errata/RHSA-2012-0103.html
XForce ISS Database: squirrelmail-http-clickjacking(68512)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68512
Common Vulnerability Exposure (CVE) ID: CVE-2010-4555
XForce ISS Database: squirrelmail-dropdown-xss(68510)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68510
XForce ISS Database: squirrelmail-spellchecking-xss(68511)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68511
Common Vulnerability Exposure (CVE) ID: CVE-2011-2023
http://securitytracker.com/id?1025766
Common Vulnerability Exposure (CVE) ID: CVE-2011-2752
XForce ISS Database: squirrelmail-newline-crlf-injection(68587)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68587
Common Vulnerability Exposure (CVE) ID: CVE-2011-2753
XForce ISS Database: squirrelmail-authentication-csrf(68586)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68586
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.