Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 239054 (CVE-2008-3663)

Summary: mail-client/squirrelmail <1.4.16 Insecure cookie session hijacking (CVE-2008-3663)
Product: Gentoo Security Reporter: Robert Buchholz (RETIRED) <rbu>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: eradicator, net-mail+disabled, tv
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://www.squirrelmail.org/
Whiteboard: B4 [noglsa]
Package list:
Runtime testing required: ---

Description Robert Buchholz (RETIRED) gentoo-dev 2008-09-29 14:51:32 UTC
CVE-2008-3663 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3663):
  Squirrelmail 1.4.15 does not set the secure flag for the session
  cookie in an https session, which can cause the cookie to be sent in
  http requests and make it easier for remote attackers to capture this
  cookie.
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2008-09-29 15:08:53 UTC
ANNOUNCE: SquirrelMail 1.4.16 Released
Sep 28, 2008 by Thijs Kinkhorst
 	
The SquirrelMail team is happy to announce the release 1.4.16. The most notable change is that cookies are now sent with the secure attribute set for HTTPS-connections, meaning that they cannot leak to an HTTP-connection on the same SquirrelMail installation. For details see the included ReleaseNotes. We advise users that offer their SquirrelMail both over HTTP and HTTPS to upgrade.
Comment 2 Tobias Scherbaum (RETIRED) gentoo-dev 2008-10-01 19:00:22 UTC
1.4.16 in CVS.
Comment 3 Tobias Scherbaum (RETIRED) gentoo-dev 2008-10-27 19:28:28 UTC
(In reply to comment #2)
> 1.4.16 in CVS.
> 

*ping*
Comment 4 Robert Buchholz (RETIRED) gentoo-dev 2008-10-27 20:19:06 UTC
Arches, please test and mark stable:
=mail-client/squirrelmail-1.4.16
Target keywords : "alpha amd64 ppc ppc64 sparc x86"
Comment 5 Brent Baude (RETIRED) gentoo-dev 2008-10-28 00:19:49 UTC
ppc64 done
Comment 6 Richard Freeman gentoo-dev 2008-10-29 02:00:35 UTC
amd64 stable
Comment 7 Markus Meier gentoo-dev 2008-10-29 22:15:10 UTC
x86 stable
Comment 8 Raúl Porcel (RETIRED) gentoo-dev 2008-10-30 10:30:34 UTC
alpha/sparc stable
Comment 9 Tobias Scherbaum (RETIRED) gentoo-dev 2008-10-30 19:16:21 UTC
ppc stable
Comment 10 Tobias Heinlein (RETIRED) gentoo-dev 2008-10-31 21:34:08 UTC
Ready for vote, I vote YES.
Comment 11 Robert Buchholz (RETIRED) gentoo-dev 2008-11-26 18:49:15 UTC
I vote NO on this bug. It's not worse than any of your XSS issues, allowing for compromise of credentials when visiting a malicious link -- and more so, only if someone can tap your link.
Comment 12 Pierre-Yves Rofes (RETIRED) gentoo-dev 2008-11-26 22:19:28 UTC
no too and closing.