CVE-2007-3634

Unspecified vulnerability in the G/PGP (GPG) Plugin 2.0 for Squirrelmail 1.4.10a allows remote authenticated users to execute arbitrary commands via unspecified vectors, possibly related to the passphrase variable in the gpg_sign_attachment function, aka ZD-00000004. this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:squirrelmail:gpg_plugin:2.0:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.10a:*:*:*:*:*:*:*

History

21 Nov 2024, 00:33

Type Values Removed Values Added
References () http://lists.immunitysec.com/pipermail/dailydave/2007-July/004448.html - () http://lists.immunitysec.com/pipermail/dailydave/2007-July/004448.html -
References () http://lists.immunitysec.com/pipermail/dailydave/2007-July/004452.html - () http://lists.immunitysec.com/pipermail/dailydave/2007-July/004452.html -
References () http://lists.immunitysec.com/pipermail/dailydave/2007-July/004453.html - () http://lists.immunitysec.com/pipermail/dailydave/2007-July/004453.html -
References () http://osvdb.org/45788 - () http://osvdb.org/45788 -
References () http://www.attrition.org/pipermail/vim/2007-July/001703.html - () http://www.attrition.org/pipermail/vim/2007-July/001703.html -
References () http://www.securityfocus.com/bid/24782 - Patch () http://www.securityfocus.com/bid/24782 - Patch
References () http://www.wslabi.com/wabisabilabi/initPublishedBid.do? - () http://www.wslabi.com/wabisabilabi/initPublishedBid.do? -

Information

Published : 2007-07-10 00:30

Updated : 2024-11-21 00:33


NVD link : CVE-2007-3634

Mitre link : CVE-2007-3634

CVE.ORG link : CVE-2007-3634


JSON object : View

Products Affected

squirrelmail

  • squirrelmail
  • gpg_plugin