=====================================================================
                                  CERT-Renater

                       Note d'Information No. 2005/VULN689
_____________________________________________________________________

DATE                      : 04/11/2005

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running squirrelmail.

======================================================================

  _______________________________________________________________________

  Mandriva Linux Security Advisory                         MDKSA-2005:202
  http://www.mandriva.com/security/
  _______________________________________________________________________

  Package : squirrelmail
  Date    : November 1, 2005
  Affected: Corporate 3.0
  _______________________________________________________________________

  Problem Description:

  A vulnerability in the way that SquirrelMail handled the $_POST
  variables was discovered.  If a user was tricked into visiting a
  malicious URL, the user's SquirrelMail preferences could be read or
  modified.

  This vulnerability is corrected in SquirrelMail 1.4.5 and the updated
  packages provide the latest stable version.
  _______________________________________________________________________

  References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2095
  _______________________________________________________________________

  Updated Packages:

  Corporate 3.0:
  81cf3711a3faf9a95c69a8ece4962801  corporate/3.0/RPMS/squirrelmail-1.4.5-1.1.C30mdk.noarch.rpm
  20eb541402352ed58b6d9e0ffd051168  corporate/3.0/RPMS/squirrelmail-poutils-1.4.5-1.1.C30mdk.noarch.rpm
  c03a4c37539bd9e5aee916946c196366  corporate/3.0/SRPMS/squirrelmail-1.4.5-1.1.C30mdk.src.rpm

  Corporate 3.0/X86_64:
  81cf3711a3faf9a95c69a8ece4962801  x86_64/corporate/3.0/RPMS/squirrelmail-1.4.5-1.1.C30mdk.noarch.rpm
  20eb541402352ed58b6d9e0ffd051168  x86_64/corporate/3.0/RPMS/squirrelmail-poutils-1.4.5-1.1.C30mdk.noarch.rpm
  c03a4c37539bd9e5aee916946c196366  x86_64/corporate/3.0/SRPMS/squirrelmail-1.4.5-1.1.C30mdk.src.rpm
  _______________________________________________________________________

  To upgrade automatically use MandrivaUpdate or urpmi.  The verification
  of md5 checksums and GPG signatures is performed automatically for you.

  All packages are signed by Mandriva for security.  You can obtain the
  GPG public key of the Mandriva Security Team by executing:

   gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

  You can view other update advisories for Mandriva Linux at:

   http://www.mandriva.com/security/advisories

  If you want to report vulnerabilities, please contact

   security_(at)_mandriva.com
  _______________________________________________________________________

  Type Bits/KeyID     Date       User ID
  pub  1024D/22458A98 2000-07-10 Mandriva Security Team
   <security*mandriva.com>

======================================================================

         =========================================================
         Les serveurs de référence du CERT-Renater
         http://www.urec.fr/securite
         http://www.cru.fr/securite
         http://www.renater.fr
         =========================================================
         + CERT-RENATER          | tel : 01-53-94-20-44          +
         + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
         + 75013 Paris           | email: certsvp@renater.fr     +
         =========================================================


