Re: squirrelmail bug

From: Konstantin Riabitsev (iconat_private)
Date: Thu Jan 24 2002 - 13:20:44 PST

  • Next message: Ronald F. Guilmette: "Anonymous Mail Forwarding Vulnerabilities in FormMail 1.9"

    
     ('binary' encoding is not supported, stored as-is)
    In-Reply-To: <1176.213.134.140.130.1011887757.squirrelat_private>
    
    For future reference: 
    
    Please be cool -- first notify the authors of the
    package before posting to bugtraq. This is the
    generally accepted etiquette for handling the
    security-related bugs and allows developers to
    come up with the fix before the problem is widely
    known.
    
    Here is the fix for the arbitrary remote execution
    with httpd-user rights. Place this file in the
    squirrelmail/plugins/squirrelspell directory and
    execute it to fix the vulnerability.
    
    --- begin sqspell_security_fix.sh ---
    #!/bin/sh
    sed "s/.mod.php/.mod/g" sqspell_interface.php > tmp.1
    sed "s/.mod.php/.mod/g" sqspell_options.php > tmp.2
    mv -f tmp.1 sqspell_interface.php
    mv -f tmp.2 sqspell_options.php
    cd modules
    for FILE in *.mod.php; do 
            NEWFILE=`echo $FILE | sed 's/.php//'`
            mv $FILE $NEWFILE
    done
    --- end sqspell_security_fix.sh ---
    
    http://www.dulug.duke.edu/~icon/misc/security_fix.sh.txt
    
    squirrelmail-1.2.4 will contain the fix and should
    be released shortly.
    
    Regards,
    -- 
    Konstantin Riabitsev
    



    This archive was generated by hypermail 2b30 : Thu Jan 24 2002 - 14:08:25 PST