First published: Tue Jun 22 2010(Updated: )
The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail | =1.3.1 | |
SquirrelMail | =1.4.2 | |
SquirrelMail | =0.4 | |
SquirrelMail | =1.0.6 | |
SquirrelMail | =1.0.5 | |
SquirrelMail | =0.3 | |
SquirrelMail | =0.4pre2 | |
SquirrelMail | =1.4.17 | |
SquirrelMail | =1.2.0-rc3 | |
SquirrelMail | =1.1.0 | |
SquirrelMail | =1.0pre2 | |
SquirrelMail | =0.3.1 | |
SquirrelMail | =1.4.19 | |
SquirrelMail | =1.4.0-r1 | |
SquirrelMail | =0.1.2 | |
SquirrelMail | =1.2.7 | |
SquirrelMail | =1.2.6-rc1 | |
SquirrelMail | =1.4.13 | |
SquirrelMail | =1.0.1 | |
SquirrelMail | =0.2.1 | |
SquirrelMail | =1.4.12 | |
SquirrelMail | =1.4.9a | |
SquirrelMail | =1.4.6 | |
SquirrelMail | =1.4.3-r3 | |
SquirrelMail | =1.2.0 | |
SquirrelMail | =1.4.7 | |
SquirrelMail | =1.2.9 | |
SquirrelMail | =0.1 | |
SquirrelMail | =1.4.15 | |
SquirrelMail | =1.2.2 | |
SquirrelMail | =0.5pre2 | |
SquirrelMail | =1.4.2-r3 | |
SquirrelMail | =1.1.1 | |
SquirrelMail | =1.4.4_rc1 | |
SquirrelMail | =1.4.16 | |
SquirrelMail | =1.4-rc1 | |
SquirrelMail | =1.1.2 | |
SquirrelMail | =1.4.2-r5 | |
SquirrelMail | =1.4.4-rc1 | |
SquirrelMail | =0.3pre2 | |
SquirrelMail | =1.4.3 | |
SquirrelMail | =0.1.1 | |
SquirrelMail | =1.3.2 | |
SquirrelMail | =1.4.3-rc1 | |
SquirrelMail | =1.2.1 | |
SquirrelMail | =1.4.1 | |
SquirrelMail | =1.4.9 | |
SquirrelMail | =1.2 | |
SquirrelMail | =1.4.8 | |
SquirrelMail | =1.4.0 | |
SquirrelMail | =1.4.0-rc1 | |
SquirrelMail | =1.4 | |
SquirrelMail | =1.1.3 | |
SquirrelMail | =1.4.0-rc2a | |
SquirrelMail | =1.44 | |
SquirrelMail | =1.2.4 | |
SquirrelMail | =0.5pre1 | |
SquirrelMail | =1.4.5-rc1 | |
SquirrelMail | =1.2.3 | |
SquirrelMail | =1.4.10 | |
SquirrelMail | =1.4.3a | |
SquirrelMail | =1.4.2-r1 | |
SquirrelMail | =1.0.2 | |
SquirrelMail | =1.0.4 | |
SquirrelMail | =1.4.6-rc1 | |
SquirrelMail | =1.0pre1 | |
SquirrelMail | =1.2.6 | |
SquirrelMail | =1.4.15-rc1 | |
SquirrelMail | =1.4.2-r2 | |
SquirrelMail | =1.4.8.4fc6 | |
SquirrelMail | =1.4.10a | |
SquirrelMail | =1.4.4 | |
SquirrelMail | =1.4.2-r4 | |
SquirrelMail | =1.4.18 | |
SquirrelMail | =1.4.3aa | |
SquirrelMail | =0.3pre1 | |
SquirrelMail | =1.2.10 | |
SquirrelMail | =0.4pre1 | |
SquirrelMail | =1.2.5 | |
SquirrelMail | <=1.4.20 | |
SquirrelMail | =1.4.11 | |
SquirrelMail | =1.0.3 | |
SquirrelMail | =1.3.0 | |
SquirrelMail | =1.0 | |
SquirrelMail | =0.2 | |
SquirrelMail | =1.2.8 | |
SquirrelMail | =1.2.11 | |
SquirrelMail | =0.5 | |
SquirrelMail | =1.4.5 | |
SquirrelMail | =1.0pre3 | |
Fedora | =11 | |
Fedora | =12 | |
Fedora | =13 | |
Apple iOS and macOS | <10.6.8 | |
Apple macOS Server | <10.6.8 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Workstation | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2010-1637 is classified as high, due to its potential to allow unauthorized access to internal networks.
To fix CVE-2010-1637, upgrade SquirrelMail to version 1.4.21 or later, which addresses this vulnerability.
CVE-2010-1637 allows remote authenticated users to bypass firewall restrictions and scan internal networks through SquirrelMail.
CVE-2010-1637 affects SquirrelMail versions 1.4.20 and earlier.
No, CVE-2010-1637 is not a remote code execution vulnerability but rather allows network scanning via a proxy.