squirrelmail is vulnerable to denial of service (DoS). The vulnerability exists as a flaw was found in the way SquirrelMail handled failed log in attempts. A user preference file was created when attempting to log in with a password containing an 8-bit character, even if the username was not valid. A remote attacker could use this flaw to eventually consume all hard disk space on the target SquirrelMail server.
lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
lists.fedoraproject.org/pipermail/package-announce/2010-August/045372.html
lists.fedoraproject.org/pipermail/package-announce/2010-August/045383.html
rhn.redhat.com/errata/RHSA-2012-0103.html
secunia.com/advisories/40964
secunia.com/advisories/40971
squirrelmail.org/security/issue/2010-07-23
squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/functions/imap_general.php?view=patch&r1=13972&r2=13971&pathrev=13972
support.apple.com/kb/HT5130
www.debian.org/security/2010/dsa-2091
www.securityfocus.com/bid/42399
www.squirrelmail.org/security/issue/2010-06-21
www.squirrelmail.org/security/issue/2010-07-23
www.squirrelmail.org/security/issue/2011-07-10
www.squirrelmail.org/security/issue/2011-07-11
www.squirrelmail.org/security/issue/2011-07-12
www.vupen.com/english/advisories/2010/2070
www.vupen.com/english/advisories/2010/2080
access.redhat.com/errata/RHSA-2012:0103
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=618096
exchange.xforce.ibmcloud.com/vulnerabilities/61124