First published: Tue Jul 10 2007(Updated: )
Multiple unspecified vulnerabilities in the G/PGP (GPG) Plugin 2.1 for Squirrelmail allow remote attackers to execute arbitrary commands via unspecified vectors. NOTE: this information is based upon a vague pre-advisory from a reliable researcher.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail GPG Plugin | =2.0 | |
SquirrelMail | =1.4.10a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3636 is classified as a high severity vulnerability due to its potential for remote command execution.
To fix CVE-2007-3636, it is recommended to update to the latest version of the GPG Plugin for Squirrelmail.
CVE-2007-3636 allows remote attackers to execute arbitrary commands, posing a serious security risk.
CVE-2007-3636 affects SquirrelMail version 1.4.10a and GPG Plugin version 2.0.
A temporary workaround for CVE-2007-3636 may include disabling the GPG Plugin until an update is available.