Bug 500358 (CVE-2009-1580)

Summary: CVE-2009-1580 SquirrelMail: Session fixation vulnerability
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: mhlavink
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://www.squirrelmail.org/security/issue/2009-05-11
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2009-05-15 14:37:16 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Jan Lieskovsky 2009-05-12 12:38:12 UTC
From SquirrelMail vulnerability report:

An issue was fixed that allowed an attacker to possibly steal user data by hijacking the SquirrelMail login session.

Credits: Tomas Hoger


Comment 1 Fedora Update System 2009-05-12 13:07:28 UTC
squirrelmail-1.4.18-1.fc9 has been submitted as an update for Fedora 9.

Comment 2 Tomas Hoger 2009-05-12 13:23:46 UTC
This issue does not affect current squirrelmail packages shipped in Red Hat Enterprise Linux 3, 4 and 5.  Change similar to the upstream fix mentioned in comment #0 (upstream SVN r13676) was introduced via RHSA-2009:0057 (http://rhn.redhat.com/errata/RHSA-2009-0057.html) to mitigate the impact of the Red Hat-specific session management regression introduced in RHSA-2009:0010, bug #480224.  The change ensured new session id was regenerated after each successful login, and also provides protection against session fixation class of attacks.  The change has now been included in upstream SquirrelMail too.

The impact of the flaw was limited, as it required an attacker to be able to set malicious cookie on the victim's system.  Successful exploitation did not allow an attacker to get full access to the victim's mail.

Comment 3 Fedora Update System 2009-05-13 00:20:54 UTC
squirrelmail-1.4.18-1.fc9 has been pushed to the Fedora 9 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 4 Fedora Update System 2009-05-13 00:22:30 UTC
squirrelmail-1.4.18-1.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 5 Fedora Update System 2009-05-13 00:23:46 UTC
squirrelmail-1.4.18-1.fc10 has been pushed to the Fedora 10 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 6 Jan Lieskovsky 2009-05-14 18:06:54 UTC

Session fixation vulnerability in SquirrelMail before 1.4.18 allows
remote attackers to hijack web sessions via a crafted cookie.

Comment 7 Tomas Hoger 2009-05-15 14:37:16 UTC
Fedora updated now to 1.4.18, no further action required for Red Hat Enterprise Linux packages (see comment #2).  Closing.