First published: Tue May 12 2009(Updated: )
From Squirrelmail vulnerability report: An issue was fixed that allowed phishing and cross-site scripting (XSS) attacks to be run by surreptitious placement of content in specially-crafted emails sent to SquirrelMail users. Credits: Luc Beurton Patch: <a href="http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13667">http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13667</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail | =1.3.1 | |
SquirrelMail | =0.4 | |
SquirrelMail | =1.0.6 | |
SquirrelMail | =1.0.5 | |
SquirrelMail | =0.3 | |
SquirrelMail | =0.4pre2 | |
SquirrelMail | =1.1.0 | |
SquirrelMail | =1.0pre2 | |
SquirrelMail | =0.3.1 | |
SquirrelMail | =0.1.2 | |
SquirrelMail | =1.2.7 | |
SquirrelMail | =1.0.1 | |
SquirrelMail | =0.2.1 | |
SquirrelMail | =1.4.12 | |
SquirrelMail | =1.2.0 | |
SquirrelMail | =1.2.9 | |
SquirrelMail | =0.1 | |
SquirrelMail | =1.4.15 | |
SquirrelMail | =1.2.2 | |
SquirrelMail | =0.5pre2 | |
SquirrelMail | =1.1.1 | |
SquirrelMail | =1.4.16 | |
SquirrelMail | =1.2.0_rc3 | |
SquirrelMail | =1.1.2 | |
SquirrelMail | =1.4.15_rc1 | |
SquirrelMail | ||
SquirrelMail | =0.3pre2 | |
SquirrelMail | =0.1.1 | |
SquirrelMail | =1.3.2 | |
SquirrelMail | =1.2.1 | |
SquirrelMail | =1.4.1 | |
SquirrelMail | =1.2 | |
SquirrelMail | =1.4.0_rc2a | |
SquirrelMail | =1.4.0_rc1 | |
SquirrelMail | =1.4.0 | |
SquirrelMail | =1.4 | |
SquirrelMail | =1.1.3 | |
SquirrelMail | =1.2.4 | |
SquirrelMail | =0.5pre1 | |
SquirrelMail | =1.2.3 | |
SquirrelMail | =1.4.10 | |
SquirrelMail | =1.0.2 | |
SquirrelMail | =1.0.4 | |
SquirrelMail | =1.0pre1 | |
SquirrelMail | =1.2.6 | |
SquirrelMail | =1.4.10a | |
SquirrelMail | =0.3pre1 | |
SquirrelMail | =1.2.10 | |
SquirrelMail | =0.4pre1 | |
SquirrelMail | =1.2.5 | |
SquirrelMail | =1.4.11 | |
SquirrelMail | =1.0.3 | |
SquirrelMail | =1.3.0 | |
SquirrelMail | =1.0 | |
SquirrelMail | =0.2 | |
SquirrelMail | =1.2.8 | |
SquirrelMail | =1.2.11 | |
SquirrelMail | =0.5 | |
SquirrelMail | <=1.4.17 | |
SquirrelMail | =1.0pre3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1581 has a moderate severity rating due to its potential for phishing and cross-site scripting attacks.
To fix CVE-2009-1581, update your SquirrelMail to the latest version that addresses this vulnerability.
CVE-2009-1581 affects multiple versions of SquirrelMail, including 1.3.1, 1.0.6, and several earlier versions.
Yes, CVE-2009-1581 can potentially lead to data breaches through phishing attacks facilitated by cross-site scripting.
Yes, patches are available as part of newer SquirrelMail releases that resolve the issues associated with CVE-2009-1581.