First published: Tue Jul 12 2011(Updated: )
It was found that SquirrelMail webmail client did not properly handle generation of a particular web page HTML Header in cases, when entire application was loaded in separated HTML frame, potentially overloading other HTML elements on top of SquirrelMail's user interface. A remote attacker could use this flaw to obtain access to sensitive user data (passwords for example). Upstream advisory: [1] <a href="http://www.squirrelmail.org/security/issue/2011-07-12">http://www.squirrelmail.org/security/issue/2011-07-12</a> Relevant upstream patch: [2] <a href="http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14117">http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14117</a>
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-720693 is considered moderate due to potential impacts on the user interface.
To fix REDHAT-BUG-720693, update your SquirrelMail to the latest version where this issue is addressed.
Potential risks of REDHAT-BUG-720693 include UI overload and decreased performance from remote attackers exploiting the vulnerability.
Yes, REDHAT-BUG-720693 directly affects SquirrelMail's webmail functionality by improperly handling HTML headers.
Yes, REDHAT-BUG-720693 can be exploited by a remote attacker through specific manipulation of the SquirrelMail web application.