Common Vulnerabilities and Exposures assigned an identifier CVE-2011-2753 to the following vulnerability: Multiple cross-site request forgery (CSRF) vulnerabilities in SquirrelMail 1.4.21 and earlier allow remote attackers to hijack the authentication of unspecified victims via vectors involving (1) the empty trash implementation and (2) the Index Order (aka options_order) page, a different issue than CVE-2010-4555. References: [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2753 [2] http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119 [3] https://bugzilla.redhat.com/show_bug.cgi?id=720694 Upstream patch (subpart of [3], relevant to options order and empty trash implementation): [4] http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/src/options_order.php?view=patch&r1=14084&r2=14119&pathrev=14119 (options_order) [5] http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/src/empty_trash.php?view=patch&r1=14084&r2=14119&pathrev=14119 (empty trash implementation)
These issues affect the versions of the squirrelmail package, as shipped with Red Hat Enterprise Linux 4 and 5. -- These issues do not affect the version of the squirrelmail package, as present within EPEL-6 repository. Relevant package update has been already performed. -- These issues do not affect the versions of the squirrelmail package, as shipped with Fedora release of 14 and 15. Squirrelmail package updates has been already scheduled (squirrelmail-1.4.22-2.fc14, squirrelmail-1.4.22-2.fc15) and once they have passed the required testing, they will be pushed to particular Fedora stable repository.
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2012:0103 https://rhn.redhat.com/errata/RHSA-2012-0103.html