First published: Tue Aug 12 2008(Updated: )
Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie. Reference: BUGTRAQ:20080922 Squirrelmail: Session hijacking vulnerability, <a href="https://access.redhat.com/security/cve/CVE-2008-3663">CVE-2008-3663</a> Reference: URL:<a href="http://www.securityfocus.com/archive/1/archive/1/496601/100/0/threaded">http://www.securityfocus.com/archive/1/archive/1/496601/100/0/threaded</a> Reference: MISC:<a href="http://int21.de/cve/CVE-2008-3663-squirrelmail.html">http://int21.de/cve/CVE-2008-3663-squirrelmail.html</a> Reference: BID:31321 Reference: URL:<a href="http://www.securityfocus.com/bid/31321">http://www.securityfocus.com/bid/31321</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squirrelmail Squirrelmail | =1.4.15 | |
redhat/squirrelmail | <0:1.4.8-8.el3 | 0:1.4.8-8.el3 |
redhat/squirrelmail | <0:1.4.8-5.el4_7.2 | 0:1.4.8-5.el4_7.2 |
redhat/squirrelmail | <0:1.4.8-5.el5_2.2 | 0:1.4.8-5.el5_2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.