Bug 500358 (CVE-2009-1580) - CVE-2009-1580 SquirrelMail: Session fixation vulnerability
Summary: CVE-2009-1580 SquirrelMail: Session fixation vulnerability
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2009-1580
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://www.squirrelmail.org/security/...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-05-12 12:38 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:30 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-05-15 14:37:16 UTC


Attachments (Terms of Use)

Description Jan Lieskovsky 2009-05-12 12:38:12 UTC
From SquirrelMail vulnerability report:

An issue was fixed that allowed an attacker to possibly steal user data by hijacking the SquirrelMail login session.

Credits: Tomas Hoger

Patch: 
http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13676

Comment 1 Fedora Update System 2009-05-12 13:07:28 UTC
squirrelmail-1.4.18-1.fc9 has been submitted as an update for Fedora 9.
http://admin.fedoraproject.org/updates/squirrelmail-1.4.18-1.fc9

Comment 2 Tomas Hoger 2009-05-12 13:23:46 UTC
This issue does not affect current squirrelmail packages shipped in Red Hat Enterprise Linux 3, 4 and 5.  Change similar to the upstream fix mentioned in comment #0 (upstream SVN r13676) was introduced via RHSA-2009:0057 (http://rhn.redhat.com/errata/RHSA-2009-0057.html) to mitigate the impact of the Red Hat-specific session management regression introduced in RHSA-2009:0010, bug #480224.  The change ensured new session id was regenerated after each successful login, and also provides protection against session fixation class of attacks.  The change has now been included in upstream SquirrelMail too.

The impact of the flaw was limited, as it required an attacker to be able to set malicious cookie on the victim's system.  Successful exploitation did not allow an attacker to get full access to the victim's mail.

Comment 3 Fedora Update System 2009-05-13 00:20:54 UTC
squirrelmail-1.4.18-1.fc9 has been pushed to the Fedora 9 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 4 Fedora Update System 2009-05-13 00:22:30 UTC
squirrelmail-1.4.18-1.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 5 Fedora Update System 2009-05-13 00:23:46 UTC
squirrelmail-1.4.18-1.fc10 has been pushed to the Fedora 10 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 6 Jan Lieskovsky 2009-05-14 18:06:54 UTC
CVE-2009-1580:

Session fixation vulnerability in SquirrelMail before 1.4.18 allows
remote attackers to hijack web sessions via a crafted cookie.

Comment 7 Tomas Hoger 2009-05-15 14:37:16 UTC
Fedora updated now to 1.4.18, no further action required for Red Hat Enterprise Linux packages (see comment #2).  Closing.


Note You need to log in before you can comment on or make changes to this bug.