Vulnerability CVE-2010-1637


Published: 2010-06-22   Modified: 2012-02-13

Description:
The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4/10
2.9/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Squirrelmail -> Squirrelmail 

 References:
http://www.openwall.com/lists/oss-security/2010/06/21/1
http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951
http://squirrelmail.org/security/issue/2010-06-21
http://www.vupen.com/english/advisories/2010/1554
http://www.vupen.com/english/advisories/2010/1536
http://www.vupen.com/english/advisories/2010/1535
http://www.securityfocus.com/bid/40307
http://www.securityfocus.com/bid/40291
http://www.openwall.com/lists/oss-security/2010/05/25/9
http://www.openwall.com/lists/oss-security/2010/05/25/3
http://www.mandriva.com/security/advisories?name=MDVSA-2010:120
http://support.apple.com/kb/HT5130
http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951
http://secunia.com/advisories/40307
http://rhn.redhat.com/errata/RHSA-2012-0103.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html

Copyright 2024, cxsecurity.com

 

Back to Top