Vulnerability Name: | CVE-2006-4019 (CCN-28365) | ||||||||||||||||||||
Assigned: | 2006-08-11 | ||||||||||||||||||||
Published: | 2006-08-11 | ||||||||||||||||||||
Updated: | 2018-10-17 | ||||||||||||||||||||
Summary: | Dynamic variable evaluation vulnerability in compose.php in SquirrelMail 1.4.0 to 1.4.7 allows remote attackers to overwrite arbitrary program variables and read or write the attachments and preferences of other users. | ||||||||||||||||||||
CVSS v3 Severity: | 4.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)
| ||||||||||||||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N) 4.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: SGI Type: UNKNOWN 20061001-01-P Source: VIM Type: UNKNOWN 20060811 SquirrelMail issue is dynamic variable evaluation Source: MITRE Type: CNA CVE-2006-4019 Source: CCN Type: Apple Security Update 2007-007 About Security Update 2007-007 Source: CONFIRM Type: UNKNOWN http://docs.info.apple.com/article.html?artnum=306172 Source: CCN Type: Apple Web site Apple security updates Source: APPLE Type: UNKNOWN APPLE-SA-2007-07-31 Source: FULLDISC Type: UNKNOWN 20060811 rPSA-2006-0152-1 squirrelmail Source: CCN Type: RHSA-2006-0668 squirrelmail security update Source: CCN Type: SA21354 SquirrelMail "compose.php" Variable Manipulation Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory 21354 Source: SECUNIA Type: UNKNOWN 21444 Source: SECUNIA Type: UNKNOWN 21586 Source: SECUNIA Type: UNKNOWN 22080 Source: SECUNIA Type: UNKNOWN 22104 Source: SECUNIA Type: UNKNOWN 22487 Source: CCN Type: SA26235 Mac OS X Security Update Fixes Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 26235 Source: CCN Type: SECTRACK ID: 1016689 SquirrelMail `compose.php` Lets Remote Authenticated Users Overwrite Variables Source: SECTRACK Type: UNKNOWN 1016689 Source: CCN Type: ASA-2006-209 squirrelmail security update (RHSA-2006-0668) Source: DEBIAN Type: UNKNOWN DSA-1154 Source: DEBIAN Type: DSA-1154 squirrelmail -- variable overwriting Source: MANDRIVA Type: UNKNOWN MDKSA-2006:147 Source: SUSE Type: UNKNOWN SUSE-SR:2006:023 Source: OSVDB Type: UNKNOWN 27917 Source: CCN Type: OSVDB ID: 27917 SquirrelMail compose.php Arbitrary Variable Manipulation Source: REDHAT Type: UNKNOWN RHSA-2006:0668 Source: BUGTRAQ Type: UNKNOWN 20060811 rPSA-2006-0152-1 squirrelmail Source: BUGTRAQ Type: UNKNOWN 20060811 SquirrelMail 1.4.8 released - fixes variable overwriting attack Source: BID Type: UNKNOWN 19486 Source: CCN Type: BID-19486 SquirrelMail Compose.PHP Multiple Information Disclosure and Data Modification Vulnerabilities Source: BID Type: UNKNOWN 25159 Source: CCN Type: BID-25159 Apple Mac OS X 2007-007 Multiple Security Vulnerabilities Source: CCN Type: SquirrelMail Security Advisory SquirrelMail -Variable overwriting in compose.php Source: MISC Type: Patch http://www.squirrelmail.org/patches/sqm1.4.7-expired-post-fix-full.patch Source: CCN Type: SquirrelMail Web site Variable overwriting in compose.php Source: CONFIRM Type: Patch http://www.squirrelmail.org/security/issue/2006-08-11 Source: VUPEN Type: UNKNOWN ADV-2006-3271 Source: VUPEN Type: UNKNOWN ADV-2007-2732 Source: XF Type: UNKNOWN squirrelmail-compose-variable-overwrite(28365) Source: XF Type: UNKNOWN squirrelmail-compose-variable-overwrite(28365) Source: CONFIRM Type: UNKNOWN https://issues.rpath.com/browse/RPL-577 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11533 Source: SUSE Type: SUSE-SR:2006:023 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |