CVE Vulnerabilities

CVE-2006-0195

Published: Feb 24, 2006 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) /* and */ comments, or (2) a newline in a url specifier, which is processed by certain web browsers including Internet Explorer.

Affected Software

NameVendorStart VersionEnd Version
SquirrelmailSquirrelmail1.4 (including)1.4 (including)
SquirrelmailSquirrelmail1.4.1 (including)1.4.1 (including)
SquirrelmailSquirrelmail1.4.2 (including)1.4.2 (including)
SquirrelmailSquirrelmail1.4.3 (including)1.4.3 (including)
SquirrelmailSquirrelmail1.4.3_r3 (including)1.4.3_r3 (including)
SquirrelmailSquirrelmail1.4.3_rc1 (including)1.4.3_rc1 (including)
SquirrelmailSquirrelmail1.4.3a (including)1.4.3a (including)
SquirrelmailSquirrelmail1.4.4 (including)1.4.4 (including)
SquirrelmailSquirrelmail1.4.4_rc1 (including)1.4.4_rc1 (including)
SquirrelmailSquirrelmail1.4.5 (including)1.4.5 (including)
SquirrelmailSquirrelmail1.4.6_rc1 (including)1.4.6_rc1 (including)
SquirrelmailSquirrelmail1.4_rc1 (including)1.4_rc1 (including)
Red Hat Enterprise Linux 3RedHatsquirrelmail-0:1.4.6-5.el3*
Red Hat Enterprise Linux 4RedHatsquirrelmail-0:1.4.6-5.el4*
SquirrelmailUbuntudapper*
SquirrelmailUbuntudevel*
SquirrelmailUbuntuedgy*
SquirrelmailUbuntufeisty*

References