CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
95.3%
functions/imap_general.php in SquirrelMail before 1.4.21 does not properly handle 8-bit characters in passwords, which allows remote attackers to cause a denial of service (disk consumption) by making many IMAP login attempts with different usernames, leading to the creation of many preferences files.
Vendor | Product | Version | CPE |
---|---|---|---|
squirrelmail | squirrelmail | * | cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:* |
squirrelmail | squirrelmail | 1.4 | cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:* |
squirrelmail | squirrelmail | 1.4 | cpe:2.3:a:squirrelmail:squirrelmail:1.4:rc1:*:*:*:*:*:* |
squirrelmail | squirrelmail | 1.4.0 | cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:* |
squirrelmail | squirrelmail | 1.4.0 | cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:rc1:*:*:*:*:*:* |
squirrelmail | squirrelmail | 1.4.0 | cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:rc2a:*:*:*:*:*:* |
squirrelmail | squirrelmail | 1.4.0-r1 | cpe:2.3:a:squirrelmail:squirrelmail:1.4.0-r1:*:*:*:*:*:*:* |
squirrelmail | squirrelmail | 1.4.0_rc1 | cpe:2.3:a:squirrelmail:squirrelmail:1.4.0_rc1:*:*:*:*:*:*:* |
squirrelmail | squirrelmail | 1.4.0_rc2a | cpe:2.3:a:squirrelmail:squirrelmail:1.4.0_rc2a:*:*:*:*:*:*:* |
squirrelmail | squirrelmail | 1.4.1 | cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:* |
lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
lists.fedoraproject.org/pipermail/package-announce/2010-August/045372.html
lists.fedoraproject.org/pipermail/package-announce/2010-August/045383.html
rhn.redhat.com/errata/RHSA-2012-0103.html
secunia.com/advisories/40964
secunia.com/advisories/40971
squirrelmail.org/security/issue/2010-07-23
squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/functions/imap_general.php?view=patch&r1=13972&r2=13971&pathrev=13972
support.apple.com/kb/HT5130
www.debian.org/security/2010/dsa-2091
www.securityfocus.com/bid/42399
www.vupen.com/english/advisories/2010/2070
www.vupen.com/english/advisories/2010/2080
bugzilla.redhat.com/show_bug.cgi?id=618096
exchange.xforce.ibmcloud.com/vulnerabilities/61124