Secunia Security Advisory - A package compromise has been reported in multiple SquirrelMail plugins, which can be exploited by malicious people to disclose sensitive information.
2a3ea40374a14896328e88a57c34b354c687afeca65a81bc6a1b465ea4543606
----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability
intelligence source on the market.
Implement it through Secunia.
For more information visit:
http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com
----------------------------------------------------------------------
TITLE:
SquirrelMail Multiple Plugins Package Compromise
SECUNIA ADVISORY ID:
SA36087
VERIFY ADVISORY:
http://secunia.com/advisories/36087/
DESCRIPTION:
A package compromise has been reported in multiple SquirrelMail
plugins, which can be exploited by malicious people to disclose
sensitive information.
The vendor reports that the packages for multiple plugins have been
modified. The modifications reportedly attempt to send email
containing passwords to a certain server.
The package compromise is reported for the following plugins and
versions:
* sasql-3.2.0
* multilogin-2.4-1.2.9
* change_pass-3.0-1.4.0
SOLUTION:
Update to the latest, corrected version:
sasql-3.2.0.tar.gz
MD5: a492922e5b0d2245d4e9bc255a7c5755
multilogin-2.4-1.2.9.tar.gz
MD5: b143f2dc82f9e98dd43c632855255075
change_pass-3.0-1.4.0.tar.gz
MD5: 2cff7c5d4f6f5d8455683bb5d96bb9fe
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
SquirrelMail:
http://squirrelmail.org/index.php
http://sourceforge.net/mailarchive/message.php?msg_name=4A727634.3080008%40squirrelmail.org
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------