Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 281580 (CVE-2009-2964) - <mail-client/squirrelmail-1.4.20: CSRF vulnerability (CVE-2009-2964)
Summary: <mail-client/squirrelmail-1.4.20: CSRF vulnerability (CVE-2009-2964)
Status: RESOLVED FIXED
Alias: CVE-2009-2964
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/34627/
Whiteboard: B4 [noglsa]
Keywords:
: 281541 (view as bug list)
Depends on:
Blocks:
 
Reported: 2009-08-15 12:52 UTC by Tobias Heinlein (RETIRED)
Modified: 2010-05-22 10:36 UTC (History)
5 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
squirrelmail-1.4.20 ebuild (squirrelmail-1.4.20.ebuild,5.57 KB, text/plain)
2010-03-18 06:05 UTC, Eray Aslan
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Tobias Heinlein (RETIRED) gentoo-dev 2009-08-15 12:52:40 UTC
From secunia:

A vulnerability has been discovered in SquirrelMail, which can be exploited by malicious people to conduct cross-site request forgery attacks.

The application allows users to perform certain actions via HTTP requests without performing any validation checks to verify the requests. This can be exploited to e.g. change user preferences, delete emails, and potentially send emails when a logged-in user visits a malicious web page.

The vulnerabilities are confirmed in version 1.4.17. Other versions may also be affected.
Comment 1 Tobias Heinlein (RETIRED) gentoo-dev 2009-08-15 12:54:08 UTC
net-mail, please bump.
Comment 2 Tobias Heinlein (RETIRED) gentoo-dev 2009-08-15 12:58:46 UTC
*** Bug 281541 has been marked as a duplicate of this bug. ***
Comment 3 Tobias Scherbaum (RETIRED) gentoo-dev 2009-08-26 16:32:04 UTC
(In reply to comment #1)
> net-mail, please bump.
> 

I'd like to wait for 1.4.20 and to not commit a release candidate.
Comment 4 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-08-27 12:23:50 UTC
CVE-2009-2964 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2964):
  Multiple cross-site request forgery (CSRF) vulnerabilities in
  SquirrelMail 1.4.19 and earlier allow remote attackers to hijack the
  authentication of unspecified victims via features such as send
  message and change preferences, related to (1)
  functions/mailbox_display.php, (2) src/addrbook_search_html.php, (3)
  src/addressbook.php, (4) src/compose.php, (5) src/folders.php, (6)
  src/folders_create.php, (7) src/folders_delete.php, (8)
  src/folders_rename_do.php, (9) src/folders_rename_getname.php, (10)
  src/folders_subscribe.php, (11) src/move_messages.php, (12)
  src/options.php, (13) src/options_highlight.php, (14)
  src/options_identities.php, (15) src/options_order.php, (16)
  src/search.php, and (17) src/vcard.php.

Comment 5 Stefan Behte (RETIRED) gentoo-dev Security 2009-11-06 22:37:43 UTC
There are still only -rc versions out.
Comment 6 Eray Aslan gentoo-dev 2010-03-07 19:20:20 UTC
(In reply to comment #3)
> I'd like to wait for 1.4.20 and to not commit a release candidate.

1.4.20 is out finally.
http://downloads.sourceforge.net/project/squirrelmail/stable/1.4.20/squirrelmail-1.4.20.tar.gz?use_mirror=garr
Comment 7 Eray Aslan gentoo-dev 2010-03-18 06:05:49 UTC
Created attachment 224067 [details]
squirrelmail-1.4.20 ebuild

Ebuild for version 1.4.20 with minimum necesaary changes from squirrelmail-1.4.19.ebuild
Comment 8 Jesus Ariel Gonzalez Espiritu 2010-03-19 01:22:58 UTC
(In reply to comment #6)
> (In reply to comment #3)
> > I'd like to wait for 1.4.20 and to not commit a release candidate.
> 
> 1.4.20 is out finally.
> http://downloads.sourceforge.net/project/squirrelmail/stable/1.4.20/squirrelmail-1.4.20.tar.gz?use_mirror=garr
> 

(In reply to comment #6)
> (In reply to comment #3)

I probe the latest version 1.4.20 and still have the same problems
> > I'd like to wait for 1.4.20 and to not commit a release candidate.
> 
> 1.4.20 is out finally.
> http://downloads.sourceforge.net/project/squirrelmail/stable/1.4.20/squirrelmail-1.4.20.tar.gz?use_mirror=garr
> 

Comment 9 Matthias Dahl 2010-04-13 09:03:51 UTC
IMHO this should hit the tree asap because of the discussed security issues. Is there anything holding it back? The new version has been out for over a month now.
Comment 10 Farid 2010-05-04 12:29:52 UTC
The new 1.4.20 should really hit the tree. Where are you kind developers of gentoo? :-)

From squirrelmail.org:
"Due to the security fixes included in our last two release candidate packages, we advise all users of SquirrelMail versions 1.4.19 and below to upgrade."
Comment 11 Tobias Heinlein (RETIRED) gentoo-dev 2010-05-04 14:59:40 UTC
Maintainers seem to be MIA. I bumped it on behalf of security.

+*squirrelmail-1.4.20 (04 May 2010)
+
+  04 May 2010; Tobias Heinlein <keytoaster@gentoo.org>
+  +squirrelmail-1.4.20.ebuild:
+  Version bump, patch by Eray Aslan <eray.aslan@caf.com.tr>, security bug
+  281580
+
Comment 12 Tobias Heinlein (RETIRED) gentoo-dev 2010-05-04 15:00:23 UTC
Arches, please test and mark stable:
=mail-client/squirrelmail-1.4.20
Target keywords : "alpha amd64 ppc ppc64 sparc x86"
Comment 13 Andreas Schürch gentoo-dev 2010-05-05 05:20:51 UTC
Tests passed successful on x86, looks good to go here.
Comment 14 Farid 2010-05-05 07:21:18 UTC
Tests passed successful on amd64, looks good to go here.


Comment 15 Paweł Hajdan, Jr. (RETIRED) gentoo-dev 2010-05-09 13:34:47 UTC
x86 stable, thanks Andreas
Comment 16 Raúl Porcel (RETIRED) gentoo-dev 2010-05-09 18:30:14 UTC
alpha/sparc stable
Comment 17 Brent Baude (RETIRED) gentoo-dev 2010-05-10 15:41:16 UTC
ppc64 done
Comment 18 Joe Jezak (RETIRED) gentoo-dev 2010-05-11 13:55:42 UTC
Marked ppc stable.
Comment 19 Markus Meier gentoo-dev 2010-05-15 13:21:14 UTC
amd64 stable, all arches done.
Comment 20 Stefan Behte (RETIRED) gentoo-dev Security 2010-05-22 10:36:31 UTC
XSS, closing noglsa.