Login
Newsletter
Werbung

Sicherheit: Cross-Site Scripting in squirrelmail
Aktuelle Meldungen Distributionen
Name: Cross-Site Scripting in squirrelmail
ID: MDKSA-2005:178
Distribution: Mandriva
Plattformen: Mandriva Corporate 3.0
Datum: Mi, 12. Oktober 2005, 08:15
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3128
Applikationen: Squirrelmail

Originalnachricht

This is a multi-part message in MIME format...

------------=_1129097716-811-797

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Update Advisory
_______________________________________________________________________

Package name: squirrelmail
Advisory ID: MDKSA-2005:178
Date: October 11th, 2005

Affected versions: Corporate 3.0
______________________________________________________________________

Problem Description:

A cross-site scripting (XSS) vulnerability in add.php in Address Add
Plugin 1.9 and 2.0 for Squirrelmail allows remote attackers to inject
arbitrary web script or HTML via the IMG tag.

The updated packages have an updated Address Add plugin to correct
this problem.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3128
______________________________________________________________________

Updated Packages:

Corporate 3.0:
2341c318bfbd7734dc8b79034069885b
corporate/3.0/RPMS/squirrelmail-1.4.2-11.2.C30mdk.noarch.rpm
944a7c659d7dd2ceef0c4eef2876628e
corporate/3.0/RPMS/squirrelmail-poutils-1.4.2-11.2.C30mdk.noarch.rpm
edf57fba5bb134453ba7dbe8d18339f5
corporate/3.0/SRPMS/squirrelmail-1.4.2-11.2.C30mdk.src.rpm

Corporate 3.0/X86_64:
ef69fe51a0b58e202cbcec5e9cfcee83
x86_64/corporate/3.0/RPMS/squirrelmail-1.4.2-11.2.C30mdk.noarch.rpm
54244c96e2f1a1c27f074fbe6ed4ea85
x86_64/corporate/3.0/RPMS/squirrelmail-poutils-1.4.2-11.2.C30mdk.noarch.rpm
edf57fba5bb134453ba7dbe8d18339f5
x86_64/corporate/3.0/SRPMS/squirrelmail-1.4.2-11.2.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDTKdEmqjQ0CJFipgRAnRBAKDYqQRQRQzg7GouDPkLEnmwzfDo5wCePqcg
cD7JMILXF+xFb+8aIyr/bWM=
=LyDt
-----END PGP SIGNATURE-----


------------=_1129097716-811-797
Content-Type: text/plain; name="message.footer"
Content-Disposition: inline; filename="message.footer"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1129097716-811-797--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung