Description
Cross-site scripting (XSS) vulnerability in the decoding of encoded text in certain headers in mime.php for SquirrelMail 1.4.3a and earlier, and 1.5.1-cvs before 23rd October 2004, allows remote attackers to execute arbitrary web script or HTML.
Product(s):
- SquirrelMail 1.0.4
- SquirrelMail 1.0.5
- SquirrelMail 1.2.10
- SquirrelMail 1.2.11
- SquirrelMail 1.2.1
- SquirrelMail 1.2.2
- SquirrelMail 1.2.3
- SquirrelMail 1.2.4
- SquirrelMail 1.2.5
- SquirrelMail 1.2.6
- SquirrelMail 1.2.7
- SquirrelMail 1.2.8
- SquirrelMail 1.2.9
- SquirrelMail 1.2
- SquirrelMail 1.4.1
- SquirrelMail 1.4.2
- SquirrelMail 1.4.3
- SquirrelMail 1.4.3 -
- SquirrelMail 1.4.3 Release Candidate 1
- SquirrelMail 1.4.3 RC1
- SquirrelMail 1.4.3a
- SquirrelMail 1.4
- SquirrelMail 1.5 Dev
- Gentoo Linux
- Gentoo Linux 1.2
- Gentoo Linux 1.4
- Gentoo Linux 1.4 -
- Gentoo Linux 1.4 rc1
- Gentoo Linux 1.4 rc2
- Gentoo Linux 1.4 rc3
- Gentoo Linux 2.1.30 r9
- Gentoo Linux 2.2.28 r7
- Gentoo Linux 2.3.30 r2
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-1036, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-1036 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.