SB2017091701 - Gentoo update for SquirrelMail



SB2017091701 - Gentoo update for SquirrelMail

Published: September 17, 2017 Updated: September 21, 2017

Security Bulletin ID SB2017091701
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Command injection (CVE-ID: CVE-2017-7692)

The vulnerability allows a remote authenticated attacker to execute arbitrary commands on a targeted system.

The weakness exists due to insufficient escaping of user-supplied input by the escapeshellcmd() when configured with Sendmail as the email delivery transport method. A remote attacker can upload a specially crafted sendmail.cf file as an email attachment that is mishandled in a popen call, trigger vulnerability in the Deliver_SendMail.class.php with the initStream function and execute arbitrary shell commands to conduct further attacks.

Successful exploitation of the vulnerability may result in full system compromise.

Remediation

Install update from vendor's website.