TUCoPS :: HP Unsorted S :: b06-4201.htm

SquirrelMail 1.4.8 released - fixes variable overwriting attack
SquirrelMail 1.4.8 released - fixes variable overwriting attack
SquirrelMail 1.4.8 released - fixes variable overwriting attack




--=-nGy5JkayNIZQl6uiVN5T
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

Hello all,

Today SquirrelMail version 1.4.8 has been released with a collection of
bugfixes and an important security fix. It was possible for an
authenticated user to overwrite random variables in the compose.php
script. This may open up possible attack vectors like reading or
overwriting a user's preference file or attachments.

We advise all current SquirrelMail users to upgrade. There's also a
patch available against 1.4.7. The interesting thing is that the
function that contained the flaw was actually broken. The function is
used to resume a compose session of a user that is confronted with a
session timeout after composing a long mail. We've got two patches
available: a minimal one which just removes the code, since it was
broken anyway, and a full version that repairs the functionality and
closes the hole.

SquirrelMail can be downloaded here:
http://www.squirrelmail.org/download.php 
The patches can be found here:
http://www.squirrelmail.org/patches/sqm1.4.7-expired-post-fix-minimal.patch 
http://www.squirrelmail.org/patches/sqm1.4.7-expired-post-fix-full.patch 
They also apply against the current development version.

We'd like to thank James Bercegay of GulfTech Security Research for
finding this issue and reporting it to us.


Happy SquirrelMailing!


Thijs Kinkhorst
on behalf of the SquirrelMail team

--=-nGy5JkayNIZQl6uiVN5T
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQBE3HdhJdKMxZV9WM8RAlvUAJ4hsYD0MIzzn0E2NzkzrfQl1Bj+qQCgrUFp
/YKnQWSOcO+9qxQ4c1LVOjI=CBpv
-----END PGP SIGNATURE-----

--=-nGy5JkayNIZQl6uiVN5T--

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH