Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 26 Oct 2012 15:54:15 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Strange CVE situation (at least one ID should come of this)

Hello,

This Squirrelmail plugin came to my attention a few weeks back:
http://squirrelmail.org/plugin_view.php?id=117

It's from 2004, which is suspect in itself, but I took a look after someone
asked. It's pretty scary in there.

If I was to list the security problems I found after a few minutes of
looking, they are:

* It uses MD5 passwords
* The shadow file is directly modified without locking (which could lead to a
    race condition)
* If you get the password wrong, it doesn't unlink the empty temporary file.

None are really a big deal, you *could* run this and probably never notice
these problems.

Fundamentally though, this thing should get one CVE ID that basically say
"don't use this". How have situations like this been handled in the past?

I mailed the Squirrelmail security team. They never responded. Regardless
of their response though, the plugin site says it has been downloaded more
than 100K times, so I suspect it's still in use somewhere. My goal in this
CVE request is to raise awareness so hopefully people stop using this (and
get the Squirrelmail guys to remove it from their site).

Thanks.

-- 
    JB

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ