First published: Fri Feb 24 2006(Updated: )
CRLF injection vulnerability in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary IMAP commands via newline characters in the mailbox parameter of the sqimap_mailbox_select command, aka "IMAP injection."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail | =1.4.2 | |
SquirrelMail | =1.4.6_rc1 | |
SquirrelMail | =1.4.3_r3 | |
SquirrelMail | =1.4.3_rc1 | |
SquirrelMail | =1.4.4_rc1 | |
SquirrelMail | =1.4.3 | |
SquirrelMail | =1.4.1 | |
SquirrelMail | =1.4 | |
SquirrelMail | =1.4.3a | |
SquirrelMail | =1.4_rc1 | |
SquirrelMail | =1.4.4 | |
SquirrelMail | =1.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0377 is considered a high severity vulnerability due to its potential for remote exploitation through IMAP command injection.
To mitigate CVE-2006-0377, upgrade to a patched version of SquirrelMail, specifically versions later than 1.4.5.
CVE-2006-0377 affects SquirrelMail versions from 1.4.0 to 1.4.5.
CVE-2006-0377 is associated with CRLF injection attacks that allow remote attackers to inject arbitrary IMAP commands.
Yes, exploitation of CVE-2006-0377 can lead to unauthorized access to email accounts via manipulated IMAP commands.