First published: Mon Feb 07 2005(Updated: )
viewcert.php in the S/MIME plugin 0.4 and 0.5 for Squirrelmail allows remote attackers to execute arbitrary commands via shell metacharacters in the cert parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail S MIME plugin | =0.5 | |
SquirrelMail S MIME plugin | =0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0239 is considered to have a high severity due to its potential for remote command execution.
To fix CVE-2005-0239, upgrade the S/MIME plugin to version 0.6 or later, where the vulnerability has been addressed.
CVE-2005-0239 affects users of SquirrelMail using S/MIME Plugin versions 0.4 and 0.5.
CVE-2005-0239 can be exploited by remote attackers to execute arbitrary commands through malformed input in the cert parameter.
Yes, CVE-2005-0239 is a known vulnerability that has been documented for over a decade.