The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://download.gna.org/nasmail/nasmail-1.7.zip - | |
References | () http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html - | |
References | () http://secunia.com/advisories/35052 - Vendor Advisory | |
References | () http://secunia.com/advisories/35073 - Vendor Advisory | |
References | () http://secunia.com/advisories/35140 - | |
References | () http://secunia.com/advisories/35259 - | |
References | () http://secunia.com/advisories/37415 - | |
References | () http://secunia.com/advisories/40220 - | |
References | () http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/doc/ChangeLog - Patch | |
References | () http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/functions/imap_general.php?r1=13674&r2=13673&pathrev=13674 - Patch | |
References | () http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13674 - Patch | |
References | () http://support.apple.com/kb/HT4188 - | |
References | () http://www.debian.org/security/2009/dsa-1802 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:110 - Patch | |
References | () http://www.redhat.com/support/errata/RHSA-2009-1066.html - | |
References | () http://www.securityfocus.com/bid/34916 - Patch | |
References | () http://www.squirrelmail.org/security/issue/2009-05-10 - Patch, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2009/1296 - Patch, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2009/3315 - | |
References | () http://www.vupen.com/english/advisories/2010/1481 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=500360 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/50461 - | |
References | () https://gna.org/forum/forum.php?forum_id=2146 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10986 - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00566.html - Patch | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00572.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00577.html - Patch |
Information
Published : 2009-05-14 17:30
Updated : 2024-11-21 01:02
NVD link : CVE-2009-1579
Mitre link : CVE-2009-1579
CVE.ORG link : CVE-2009-1579
JSON object : View
Products Affected
squirrelmail
- squirrelmail
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')