GLSA-200708-08 : SquirrelMail G/PGP plugin: Arbitrary code execution

high Nessus Plugin ID 25873

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200708-08 (SquirrelMail G/PGP plugin: Arbitrary code execution)

The functions deletekey(), gpg_check_sign_pgp_mime() and gpg_recv_key() used in the SquirrelMail G/PGP encryption plugin do not properly escape user-supplied data.
Impact :

An authenticated user could use the plugin to execute arbitrary code on the server, or a remote attacker could send a specially crafted e-mail to a SquirrelMail user, possibly leading to the execution of arbitrary code with the privileges of the user running the underlying web server.
Note that the G/PGP plugin is disabled by default.
Workaround :

Enter the SquirrelMail configuration directory (/usr/share/webapps/squirrelmail/version/htdocs/config), then execute the conf.pl script. Select the plugins menu, then select the gpg plugin item number in the 'Installed Plugins' list to disable it. Press S to save your changes, then Q to quit.

Solution

All SquirrelMail users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=mail-client/squirrelmail-1.4.10a-r2'

See Also

https://security.gentoo.org/glsa/200708-08

Plugin Details

Severity: High

ID: 25873

File Name: gentoo_GLSA-200708-08.nasl

Version: 1.14

Type: local

Published: 8/13/2007

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:squirrelmail, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 8/11/2007

Vulnerability Publication Date: 7/11/2007

Reference Information

CVE: CVE-2005-1924, CVE-2006-4169

GLSA: 200708-08