Vulnerability Description
The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Squirrelmail | Squirrelmail | <= 1.4.20 |
| Fedoraproject | Fedora | 11 |
| Apple | Mac Os X | < 10.6.8 |
| Apple | Mac Os X Server | < 10.6.8 |
| Redhat | Enterprise Linux Desktop | 5.0 |
| Redhat | Enterprise Linux Server | 5.0 |
| Redhat | Enterprise Linux Workstation | 5.0 |
Related Weaknesses (CWE)
References
- http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20OudotBroken Link
- http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.htmlMailing List
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.htmlMailing List
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.htmlMailing List
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.htmlMailing List
- http://rhn.redhat.com/errata/RHSA-2012-0103.htmlThird Party Advisory
- http://secunia.com/advisories/40307Broken Link
- http://squirrelmail.org/security/issue/2010-06-21PatchVendor Advisory
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABProduct
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABPatch
- http://support.apple.com/kb/HT5130Third Party Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:120Broken Link
- http://www.openwall.com/lists/oss-security/2010/05/25/3Mailing List
- http://www.openwall.com/lists/oss-security/2010/05/25/9Mailing List
- http://www.openwall.com/lists/oss-security/2010/06/21/1Mailing ListPatch
FAQ
What is CVE-2010-1637?
CVE-2010-1637 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3...
How severe is CVE-2010-1637?
CVE-2010-1637 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-1637?
Check the references section above for vendor advisories and patch information. Affected products include: Squirrelmail Squirrelmail, Fedoraproject Fedora, Apple Mac Os X, Apple Mac Os X Server, Redhat Enterprise Linux Desktop.