First published: Tue Aug 12 2008(Updated: )
Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie. Reference: BUGTRAQ:20080922 Squirrelmail: Session hijacking vulnerability, <a href="https://access.redhat.com/security/cve/CVE-2008-3663">CVE-2008-3663</a> Reference: URL:<a href="http://www.securityfocus.com/archive/1/archive/1/496601/100/0/threaded">http://www.securityfocus.com/archive/1/archive/1/496601/100/0/threaded</a> Reference: MISC:<a href="http://int21.de/cve/CVE-2008-3663-squirrelmail.html">http://int21.de/cve/CVE-2008-3663-squirrelmail.html</a> Reference: BID:31321 Reference: URL:<a href="http://www.securityfocus.com/bid/31321">http://www.securityfocus.com/bid/31321</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/squirrelmail | <0:1.4.8-8.el3 | 0:1.4.8-8.el3 |
redhat/squirrelmail | <0:1.4.8-5.el4_7.2 | 0:1.4.8-5.el4_7.2 |
redhat/squirrelmail | <0:1.4.8-5.el5_2.2 | 0:1.4.8-5.el5_2.2 |
SquirrelMail | =1.4.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3663 is classified as a moderate severity vulnerability due to the potential for session hijacking.
To fix CVE-2008-3663, upgrade SquirrelMail to a version later than 1.4.15 that addresses the session cookie security issue.
SquirrelMail version 1.4.15 is specifically affected by CVE-2008-3663, while earlier versions may also be prone to similar issues.
CVE-2008-3663 allows session cookies to be sent over unsecured HTTP connections, increasing the risk of interception by attackers.
Yes, users can apply the patch by upgrading to a non-vulnerable version of SquirrelMail provided by the software maintainers.