First published: Thu Oct 08 2009(Updated: )
SquirrelMail is a standards-based webmail package written in PHP.<br>Form submissions in SquirrelMail did not implement protection against<br>Cross-Site Request Forgery (CSRF) attacks. If a remote attacker tricked a<br>user into visiting a malicious web page, the attacker could hijack that<br>user's authentication, inject malicious content into that user's<br>preferences, or possibly send mail without that user's permission.<br>(CVE-2009-2964)<br>Users of SquirrelMail should upgrade to this updated package, which<br>contains a backported patch to correct these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/squirrelmail | <1.4.8-5.el5_4.10 | 1.4.8-5.el5_4.10 |
redhat/squirrelmail | <1.4.8-5.el5_4.10 | 1.4.8-5.el5_4.10 |
redhat/squirrelmail | <1.4.8-5.el4_8.8 | 1.4.8-5.el4_8.8 |
redhat/squirrelmail | <1.4.8-5.el4_8.8 | 1.4.8-5.el4_8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.