Bug 500358 (CVE-2009-1580)
Summary: | CVE-2009-1580 SquirrelMail: Session fixation vulnerability | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | mhlavink |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.squirrelmail.org/security/issue/2009-05-11 | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2009-05-15 14:37:16 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Jan Lieskovsky
2009-05-12 12:38:12 UTC
squirrelmail-1.4.18-1.fc9 has been submitted as an update for Fedora 9. http://admin.fedoraproject.org/updates/squirrelmail-1.4.18-1.fc9 This issue does not affect current squirrelmail packages shipped in Red Hat Enterprise Linux 3, 4 and 5. Change similar to the upstream fix mentioned in comment #0 (upstream SVN r13676) was introduced via RHSA-2009:0057 (http://rhn.redhat.com/errata/RHSA-2009-0057.html) to mitigate the impact of the Red Hat-specific session management regression introduced in RHSA-2009:0010, bug #480224. The change ensured new session id was regenerated after each successful login, and also provides protection against session fixation class of attacks. The change has now been included in upstream SquirrelMail too. The impact of the flaw was limited, as it required an attacker to be able to set malicious cookie on the victim's system. Successful exploitation did not allow an attacker to get full access to the victim's mail. squirrelmail-1.4.18-1.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report. squirrelmail-1.4.18-1.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report. squirrelmail-1.4.18-1.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report. CVE-2009-1580: Session fixation vulnerability in SquirrelMail before 1.4.18 allows remote attackers to hijack web sessions via a crafted cookie. Fedora updated now to 1.4.18, no further action required for Red Hat Enterprise Linux packages (see comment #2). Closing. |