[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1EPZiO-0005XT-De@mercury.mandriva.com>
Date: Wed, 12 Oct 2005 00:03:48 -0600
From: Mandriva Security Team <security@...driva.com>
To: bugtraq@...urityfocus.com
Subject: MDKSA-2005:178 - Updated squirrelmail packages fixes XSS vulberability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Update Advisory
_______________________________________________________________________
Package name: squirrelmail
Advisory ID: MDKSA-2005:178
Date: October 11th, 2005
Affected versions: Corporate 3.0
______________________________________________________________________
Problem Description:
A cross-site scripting (XSS) vulnerability in add.php in Address Add
Plugin 1.9 and 2.0 for Squirrelmail allows remote attackers to inject
arbitrary web script or HTML via the IMG tag.
The updated packages have an updated Address Add plugin to correct
this problem.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3128
______________________________________________________________________
Updated Packages:
Corporate 3.0:
2341c318bfbd7734dc8b79034069885b corporate/3.0/RPMS/squirrelmail-1.4.2-11.2.C30mdk.noarch.rpm
944a7c659d7dd2ceef0c4eef2876628e corporate/3.0/RPMS/squirrelmail-poutils-1.4.2-11.2.C30mdk.noarch.rpm
edf57fba5bb134453ba7dbe8d18339f5 corporate/3.0/SRPMS/squirrelmail-1.4.2-11.2.C30mdk.src.rpm
Corporate 3.0/X86_64:
ef69fe51a0b58e202cbcec5e9cfcee83 x86_64/corporate/3.0/RPMS/squirrelmail-1.4.2-11.2.C30mdk.noarch.rpm
54244c96e2f1a1c27f074fbe6ed4ea85 x86_64/corporate/3.0/RPMS/squirrelmail-poutils-1.4.2-11.2.C30mdk.noarch.rpm
edf57fba5bb134453ba7dbe8d18339f5 x86_64/corporate/3.0/SRPMS/squirrelmail-1.4.2-11.2.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFDTKdEmqjQ0CJFipgRAnRBAKDYqQRQRQzg7GouDPkLEnmwzfDo5wCePqcg
cD7JMILXF+xFb+8aIyr/bWM=
=LyDt
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists