First published: Fri May 22 2009(Updated: )
It was discovered that original upstream patch for server-side command execution flaw affecting setups with map_yp_alias username map enabled did not address the issue completely, due to incorrect use of quoting (backticks vs. single quotes). Code execution was still possible in upstream version 1.4.18. Issue was fixed upstream in 1.4.19. Updated upstream security advisory: <a href="http://www.squirrelmail.org/security/issue/2009-05-10">http://www.squirrelmail.org/security/issue/2009-05-10</a> Full upstream patch: <a href="http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/functions/imap_general.php?r1=13549&r2=13733">http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/functions/imap_general.php?r1=13549&r2=13733</a>
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-502137 is considered critical due to its potential for server-side command execution.
To fix REDHAT-BUG-502137, update SquirrelMail to the latest version that addresses the quoting issues in the mapping of usernames.
REDHAT-BUG-502137 affects SquirrelMail setups that have the map_yp_alias username map enabled.
REDHAT-BUG-502137 is a server-side command execution vulnerability.
Yes, there are known exploits for REDHAT-BUG-502137 due to the improper handling of quoting in the vulnerable code.