Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:PHP:SQUIRRELMAIL-AUTH

Severity

Low

Recommended

No

Category

HTTP

Keywords

SquirrelMail Authentication Bypass

Release Date

2005/08/15

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: SquirrelMail Authentication Bypass


This signature detects an attemps to bypass the authentication mechanism of SquirrelMail. SquirrelMail 1.4.4 and earlier does not properly sanitize the $_POST variable, which can allow remote attackers to read or modify other users preferences.

Extended Description

SquirrelMail is affected by an insecure variable handling vulnerability. It was reported that an attacker can exploit this vulnerability to disclose and manipulate users' preferences, write arbitrary files in the context of 'www-data', carry out cross-site scripting and various other attacks. Due to a lack of information, further details cannot be described at the moment. This BID will be update when more information becomes available.

Affected Products

  • Apple Mac OS X Server 10.3.9
  • Apple Mac OS X Server 10.4.2
  • Mandriva Corporate Server 3.0.0
  • Mandriva Corporate Server 3.0.0 X86 64
  • Red Hat Desktop 3.0.0
  • Red Hat Desktop 4.0.0
  • Red Hat Enterprise Linux AS 3
  • Red Hat Enterprise Linux AS 4
  • Red Hat Enterprise Linux ES 3
  • Red Hat Enterprise Linux ES 4
  • Red Hat Enterprise Linux WS 3
  • Red Hat Enterprise Linux WS 4
  • Red Hat Fedora Core1
  • Red Hat Fedora Core2
  • Red Hat Fedora Core3
  • Red Hat Fedora Core4
  • Red Hat Linux 9.0.0 I386
  • SquirrelMail 1.2.6
  • SquirrelMail 1.4.0
  • SquirrelMail 1.4.0 RC1
  • SquirrelMail 1.4.1
  • SquirrelMail 1.4.2
  • SquirrelMail 1.4.3
  • SquirrelMail 1.4.3 A
  • SquirrelMail 1.4.3 R3
  • SquirrelMail 1.4.3 RC1
  • SquirrelMail 1.4.4
  • SquirrelMail 1.4.4 RC1
  • SquirrelMail 1.4.8
  • SuSE Linux Desktop 1.0.0
  • SuSE Linux Personal 8.2.0
  • SuSE Linux Personal 9.0.0
  • SuSE Linux Personal 9.0.0 X86 64
  • SuSE Linux Personal 9.1.0
  • SuSE Linux Personal 9.1.0 X86 64
  • SuSE Linux Personal 9.2.0
  • SuSE Linux Personal 9.2.0 X86 64
  • SuSE Linux Personal 9.3.0
  • SuSE Linux Personal 9.3.0 X86 64
  • SuSE Linux Professional 8.2.0
  • SuSE Linux Professional 9.0.0
  • SuSE Linux Professional 9.0.0 X86 64
  • SuSE Linux Professional 9.1.0
  • SuSE Linux Professional 9.1.0 X86 64
  • SuSE Linux Professional 9.2.0
  • SuSE Linux Professional 9.2.0 X86 64
  • SuSE Linux Professional 9.3.0
  • SuSE Linux Professional 9.3.0 X86 64
  • SuSE Novell Linux Desktop 9.0.0
  • SuSE Open-Enterprise-Server 9.0.0
  • SuSE SUSE Linux Enterprise Server 8
  • SuSE SUSE Linux Enterprise Server 9
  • SuSE SuSE Linux Openexchange Server 4.0.0
  • SuSE SUSE LINUX Retail Solution 8.0.0
  • SuSE SuSE Linux School Server for i386
  • SuSE SuSE Linux Standard Server 8.0.0

References

  • BugTraq: 14254
  • CVE: CVE-2005-2095
  • URL: http://www.debian.org/security/2005/dsa-756

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out