{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2010-1637", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "[oss-security] 20100525 Re: CVE Request for Horde and Squirrelmail", "refsource" : "MLIST", "url" : "http://www.openwall.com/lists/oss-security/2010/05/25/9" }, { "name" : "[oss-security] 20100525 Re: CVE Request for Horde and Squirrelmail", "refsource" : "MLIST", "url" : "http://www.openwall.com/lists/oss-security/2010/05/25/3" }, { "name" : "[oss-security] 20100621 Re: [SquirrelMail-Security] CVE Request for Horde and Squirrelmail", "refsource" : "MLIST", "url" : "http://www.openwall.com/lists/oss-security/2010/06/21/1" }, { "name" : "http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69", "refsource" : "MISC", "url" : "http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69" }, { "name" : "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951", "refsource" : "MISC", "url" : "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951" }, { "name" : "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951", "refsource" : "MISC", "url" : "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951" }, { "name" : "http://squirrelmail.org/security/issue/2010-06-21", "refsource" : "CONFIRM", "url" : "http://squirrelmail.org/security/issue/2010-06-21" }, { "name" : "http://support.apple.com/kb/HT5130", "refsource" : "CONFIRM", "url" : "http://support.apple.com/kb/HT5130" }, { "name" : "APPLE-SA-2012-02-01-1", "refsource" : "APPLE", "url" : "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name" : "FEDORA-2010-10244", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.html" }, { "name" : "FEDORA-2010-10259", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.html" }, { "name" : "FEDORA-2010-10264", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.html" }, { "name" : "MDVSA-2010:120", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:120" }, { "name" : "RHSA-2012:0103", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2012-0103.html" }, { "name" : "40291", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/40291" }, { "name" : "40307", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/40307" }, { "name" : "40307", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/40307" }, { "name" : "ADV-2010-1535", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2010/1535" }, { "name" : "ADV-2010-1536", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2010/1536" }, { "name" : "ADV-2010-1554", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2010/1554" } ] } }