Security Advisory Moderate: squirrelmail security update

Advisory: RHSA-2009:1490-1
Type: Security Advisory
Severity: Moderate
Issued on: 2009-10-08
Last updated on: 2009-10-08
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)
Red Hat Enterprise Linux EUS (v. 5.4.z server)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2009-2964

Details

An updated squirrelmail package that fixes several security issues is now
available for Red Hat Enterprise Linux 3, 4, and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

SquirrelMail is a standards-based webmail package written in PHP.

Form submissions in SquirrelMail did not implement protection against
Cross-Site Request Forgery (CSRF) attacks. If a remote attacker tricked a
user into visiting a malicious web page, the attacker could hijack that
user's authentication, inject malicious content into that user's
preferences, or possibly send mail without that user's permission.
(CVE-2009-2964)

Users of SquirrelMail should upgrade to this updated package, which
contains a backported patch to correct these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
squirrelmail-1.4.8-5.el5_4.10.src.rpm
File outdated by:  RHSA-2013:0126
    MD5: 77405a71e4d333b8ed773c906d47012b
 
IA-32:
squirrelmail-1.4.8-5.el5_4.10.noarch.rpm
File outdated by:  RHSA-2013:0126
    MD5: 1e6ce2a375cb2975c47f6357a80d2e60
 
x86_64:
squirrelmail-1.4.8-5.el5_4.10.noarch.rpm
File outdated by:  RHSA-2013:0126
    MD5: 1e6ce2a375cb2975c47f6357a80d2e60
 
Red Hat Desktop (v. 3)

IA-32:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
x86_64:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
Red Hat Desktop (v. 4)

IA-32:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
x86_64:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
squirrelmail-1.4.8-5.el5_4.10.src.rpm
File outdated by:  RHSA-2013:0126
    MD5: 77405a71e4d333b8ed773c906d47012b
 
IA-32:
squirrelmail-1.4.8-5.el5_4.10.noarch.rpm
File outdated by:  RHSA-2013:0126
    MD5: 1e6ce2a375cb2975c47f6357a80d2e60
 
IA-64:
squirrelmail-1.4.8-5.el5_4.10.noarch.rpm
File outdated by:  RHSA-2013:0126
    MD5: 1e6ce2a375cb2975c47f6357a80d2e60
 
PPC:
squirrelmail-1.4.8-5.el5_4.10.noarch.rpm
File outdated by:  RHSA-2013:0126
    MD5: 1e6ce2a375cb2975c47f6357a80d2e60
 
s390x:
squirrelmail-1.4.8-5.el5_4.10.noarch.rpm
File outdated by:  RHSA-2013:0126
    MD5: 1e6ce2a375cb2975c47f6357a80d2e60
 
x86_64:
squirrelmail-1.4.8-5.el5_4.10.noarch.rpm
File outdated by:  RHSA-2013:0126
    MD5: 1e6ce2a375cb2975c47f6357a80d2e60
 
Red Hat Enterprise Linux AS (v. 3)

IA-32:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
IA-64:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
PPC:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
s390:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
s390x:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
x86_64:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
Red Hat Enterprise Linux AS (v. 4)

IA-32:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
IA-64:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
PPC:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
s390:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
s390x:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
x86_64:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
Red Hat Enterprise Linux AS (v. 4.8.z)

IA-32:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm     MD5: 954795e27b05720706ea05d6f946992c
 
IA-64:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm     MD5: 954795e27b05720706ea05d6f946992c
 
PPC:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm     MD5: 954795e27b05720706ea05d6f946992c
 
s390:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm     MD5: 954795e27b05720706ea05d6f946992c
 
s390x:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm     MD5: 954795e27b05720706ea05d6f946992c
 
x86_64:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm     MD5: 954795e27b05720706ea05d6f946992c
 
Red Hat Enterprise Linux ES (v. 3)

IA-32:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
IA-64:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
x86_64:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
Red Hat Enterprise Linux ES (v. 4)

IA-32:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
IA-64:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
x86_64:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
Red Hat Enterprise Linux ES (v. 4.8.z)

IA-32:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm     MD5: 954795e27b05720706ea05d6f946992c
 
IA-64:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm     MD5: 954795e27b05720706ea05d6f946992c
 
x86_64:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm     MD5: 954795e27b05720706ea05d6f946992c
 
Red Hat Enterprise Linux EUS (v. 5.4.z server)

SRPMS:
squirrelmail-1.4.8-5.el5_4.10.src.rpm
File outdated by:  RHSA-2013:0126
    MD5: 77405a71e4d333b8ed773c906d47012b
 
IA-32:
squirrelmail-1.4.8-5.el5_4.10.noarch.rpm     MD5: 1e6ce2a375cb2975c47f6357a80d2e60
 
IA-64:
squirrelmail-1.4.8-5.el5_4.10.noarch.rpm     MD5: 1e6ce2a375cb2975c47f6357a80d2e60
 
PPC:
squirrelmail-1.4.8-5.el5_4.10.noarch.rpm     MD5: 1e6ce2a375cb2975c47f6357a80d2e60
 
s390x:
squirrelmail-1.4.8-5.el5_4.10.noarch.rpm     MD5: 1e6ce2a375cb2975c47f6357a80d2e60
 
x86_64:
squirrelmail-1.4.8-5.el5_4.10.noarch.rpm     MD5: 1e6ce2a375cb2975c47f6357a80d2e60
 
Red Hat Enterprise Linux WS (v. 3)

IA-32:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
IA-64:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
x86_64:
squirrelmail-1.4.8-16.el3.noarch.rpm     MD5: 102208b3d0e974d88bae991522c17e36
 
Red Hat Enterprise Linux WS (v. 4)

IA-32:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
IA-64:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
x86_64:
squirrelmail-1.4.8-5.el4_8.8.noarch.rpm
File outdated by:  RHSA-2012:0103
    MD5: 954795e27b05720706ea05d6f946992c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

517312 - CVE-2009-2964 squirrelmail: CSRF issues in all forms


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/