First published: Fri Aug 11 2006(Updated: )
Dynamic variable evaluation vulnerability in compose.php in SquirrelMail 1.4.0 to 1.4.7 allows remote attackers to overwrite arbitrary program variables and read or write the attachments and preferences of other users.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail | =1.4.2 | |
SquirrelMail | =1.4.6_rc1 | |
SquirrelMail | =1.4.3_r3 | |
SquirrelMail | =1.4.6 | |
SquirrelMail | =1.4.7 | |
SquirrelMail | =1.4.3_rc1 | |
SquirrelMail | =1.4.4_rc1 | |
SquirrelMail | =1.4.3 | |
SquirrelMail | =1.4.1 | |
SquirrelMail | =1.4.0 | |
SquirrelMail | =1.44 | |
SquirrelMail | =1.4.3a | |
SquirrelMail | =1.4_rc1 | |
SquirrelMail | =1.4.4 | |
SquirrelMail | =1.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4019 is considered a critical vulnerability due to its potential to compromise user data and account integrity.
To fix CVE-2006-4019, upgrade SquirrelMail to version 1.4.8 or later, which addresses this vulnerability.
CVE-2006-4019 affects SquirrelMail versions 1.4.0 to 1.4.7.
CVE-2006-4019 can be exploited by remote attackers to overwrite arbitrary program variables leading to unauthorized access to user attachments and preferences.
Yes, a patch is available for CVE-2006-4019 that can be applied to the affected versions of SquirrelMail.