First published: Tue May 12 2009(Updated: )
From Squirrelmail vulnerability report: An issue was fixed that allowed phishing and cross-site scripting (XSS) attacks to be run by surreptitious placement of content in specially-crafted emails sent to SquirrelMail users. Credits: Luc Beurton Patch: <a href="http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13667">http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13667</a>
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-500356 is considered high due to its potential for creating phishing and XSS attacks.
To fix REDHAT-BUG-500356, update SquirrelMail to the latest version provided in the security patch for this vulnerability.
The risks associated with REDHAT-BUG-500356 include unauthorized access to user accounts through phishing techniques and exploitation of XSS vulnerabilities.
The REDHAT-BUG-500356 vulnerability was reported by Luc Beurton.
SquirrelMail versions prior to the update that addresses REDHAT-BUG-500356 are affected.