MDKSA-2005:178 - Updated squirrelmail packages fixes XSS vulberability
Posted on: 10/12/2005 12:12 AM

The Mandriva Security Team published a new security update: MDKSA-2005:178 - Updated squirrelmail packages fixes XSS vulberability for Mandriva Linux. Here the announcement:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Update Advisory
_______________________________________________________________________

Package name: squirrelmail
Advisory ID: MDKSA-2005:178
Date: October 11th, 2005

Affected versions: Corporate 3.0
______________________________________________________________________

Problem Description:

A cross-site scripting (XSS) vulnerability in add.php in Address Add
Plugin 1.9 and 2.0 for Squirrelmail allows remote attackers to inject
arbitrary web script or HTML via the IMG tag.

The updated packages have an updated Address Add plugin to correct
this problem.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?nameƊN-2005-3128
______________________________________________________________________

Updated Packages:

Corporate 3.0:
2341c318bfbd7734dc8b79034069885b corporate/3.0/RPMS/squirrelmail-1.4.2-11.2.C30mdk.noarch.rpm
944a7c659d7dd2ceef0c4eef2876628e corporate/3.0/RPMS/squirrelmail-poutils-1.4.2-11.2.C30mdk.noarch.rpm
edf57fba5bb134453ba7dbe8d18339f5 corporate/3.0/SRPMS/squirrelmail-1.4.2-11.2.C30mdk.src.rpm

Corporate 3.0/X86_64:
ef69fe51a0b58e202cbcec5e9cfcee83 x86_64/corporate/3.0/RPMS/squirrelmail-1.4.2-11.2.C30mdk.noarch.rpm
54244c96e2f1a1c27f074fbe6ed4ea85 x86_64/corporate/3.0/RPMS/squirrelmail-poutils-1.4.2-11.2.C30mdk.noarch.rpm
edf57fba5bb134453ba7dbe8d18339f5 x86_64/corporate/3.0/SRPMS/squirrelmail-1.4.2-11.2.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
lt;security*mandriva.comgt;

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDTKdEmqjQ0CJFipgRAnRBAKDYqQRQRQzg7GouDPkLEnmwzfDo5wCePqcg
cD7JMILXF+xFb+8aIyr/bWM=
=LyDt
-----END PGP SIGNATURE-----



Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/_mdksa_2005178__updated_squirrelmail__packages_fixes_xss_vulberability.html)