Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) /* and */ comments, or (2) a newline in a url specifier, which is processed by certain web browsers including Internet Explorer.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Squirrelmail | Squirrelmail | 1.4 (including) | 1.4 (including) |
Squirrelmail | Squirrelmail | 1.4.1 (including) | 1.4.1 (including) |
Squirrelmail | Squirrelmail | 1.4.2 (including) | 1.4.2 (including) |
Squirrelmail | Squirrelmail | 1.4.3 (including) | 1.4.3 (including) |
Squirrelmail | Squirrelmail | 1.4.3_r3 (including) | 1.4.3_r3 (including) |
Squirrelmail | Squirrelmail | 1.4.3_rc1 (including) | 1.4.3_rc1 (including) |
Squirrelmail | Squirrelmail | 1.4.3a (including) | 1.4.3a (including) |
Squirrelmail | Squirrelmail | 1.4.4 (including) | 1.4.4 (including) |
Squirrelmail | Squirrelmail | 1.4.4_rc1 (including) | 1.4.4_rc1 (including) |
Squirrelmail | Squirrelmail | 1.4.5 (including) | 1.4.5 (including) |
Squirrelmail | Squirrelmail | 1.4.6_rc1 (including) | 1.4.6_rc1 (including) |
Squirrelmail | Squirrelmail | 1.4_rc1 (including) | 1.4_rc1 (including) |
Red Hat Enterprise Linux 3 | RedHat | squirrelmail-0:1.4.6-5.el3 | * |
Red Hat Enterprise Linux 4 | RedHat | squirrelmail-0:1.4.6-5.el4 | * |
Squirrelmail | Ubuntu | dapper | * |
Squirrelmail | Ubuntu | devel | * |
Squirrelmail | Ubuntu | edgy | * |
Squirrelmail | Ubuntu | feisty | * |