ID CVE-2012-2124
Summary functions/imap_general.php in SquirrelMail, as used in Red Hat Enterprise Linux (RHEL) 4 and 5, does not properly handle 8-bit characters in passwords, which allows remote attackers to cause a denial of service (disk consumption) by making many IMAP login attempts with different usernames, leading to the creation of many preference files. NOTE: this issue exists because of an incorrect fix for CVE-2010-2813.
References
Vulnerable Configurations
  • cpe:2.3:a:squirrelmail:squirrelmail:-:*:*:*:*:*:*:*
    cpe:2.3:a:squirrelmail:squirrelmail:-:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 18-01-2013 - 11:48)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
bugzilla
id 814671
title CVE-2012-2124 squirrelmail: CVE-2010-2813 not fixed in RHSA-2012:0103
oval
AND
  • comment Red Hat Enterprise Linux 5 is installed
    oval oval:com.redhat.rhba:tst:20070331001
  • comment squirrelmail is earlier than 0:1.4.8-21.el5
    oval oval:com.redhat.rhsa:tst:20130126002
  • comment squirrelmail is signed with Red Hat redhatrelease key
    oval oval:com.redhat.rhsa:tst:20070358008
rhsa
id RHSA-2013:0126
released 2013-01-08
severity Low
title RHSA-2013:0126: squirrelmail security and bug fix update (Low)
rpms squirrelmail-0:1.4.8-21.el5
refmap via4
confirm https://bugzilla.redhat.com/show_bug.cgi?id=814671
mlist [oss-security] 20120420 CVE-2012-2124 assignment notification: squirrelmail: CVE-2010-2813 not fixed in RHSA-2012:0103
secunia 51730
Last major update 18-01-2013 - 11:48
Published 18-01-2013 - 11:48
Back to Top