Lucene search

K
gentooGentoo FoundationGLSA-201709-13
HistorySep 17, 2017 - 12:00 a.m.

SquirrelMail: Remote Code Execution

2017-09-1700:00:00
Gentoo Foundation
security.gentoo.org
46

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.073 Low

EPSS

Percentile

94.1%

Background

SquirrelMail is a webmail package written in PHP. It supports IMAP and SMTP and can optionally be installed with SQL support.

Description

It was discovered that the sendmail.cf file is mishandled in a popen call.

Impact

A remote attacker, by enticing a user to open an e-mail attachment, could execute arbitrary shell commands.

Workaround

There is no known workaround at this time.

Resolution

Gentoo has discontinued support for SquirrelMail and recommends that users unmerge the package:

 # emerge --unmerge "mail-client/squirrelmail"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmail-client/squirrelmail< 1.4.23_pre20140426UNKNOWN

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.073 Low

EPSS

Percentile

94.1%