The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.

Project Subscriptions

Vendors Products
Mac Os X Subscribe
Mac Os X Server Subscribe
Fedoraproject Subscribe
Enterprise Linux Subscribe
Enterprise Linux Desktop Subscribe
Enterprise Linux Server Subscribe
Enterprise Linux Workstation Subscribe
Squirrelmail Subscribe
Squirrelmail Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-0103.html cve-icon cve-icon
http://secunia.com/advisories/40307 cve-icon cve-icon
http://squirrelmail.org/security/issue/2010-06-21 cve-icon cve-icon
http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951 cve-icon cve-icon
http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951 cve-icon cve-icon
http://support.apple.com/kb/HT5130 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:120 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2010/05/25/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2010/05/25/9 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2010/06/21/1 cve-icon cve-icon
http://www.securityfocus.com/bid/40291 cve-icon cve-icon
http://www.securityfocus.com/bid/40307 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1535 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1536 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1554 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2010-1637 cve-icon
https://www.cve.org/CVERecord?id=CVE-2010-1637 cve-icon
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00175}

epss

{'score': 0.00128}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00123}

epss

{'score': 0.00175}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T01:28:41.567Z

Reserved: 2010-04-29T00:00:00

Link: CVE-2010-1637

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2010-06-22T17:30:01.103

Modified: 2025-04-11T00:51:21.963

Link: CVE-2010-1637

cve-icon Redhat

Severity : Low

Publid Date: 2010-05-20T00:00:00Z

Links: CVE-2010-1637 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses