CVE-2003-0990
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/01/2004
Last modified:
03/04/2025
Description
The parseAddress code in (1) SquirrelMail 1.4.0 and (2) GPG Plugin 1.1 allows remote attackers to execute commands via shell metacharacters in the "To:" field.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:squirrelmail:gpg_plugin:1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=bugtraq&m=107247236124180&w=2
- http://www.bugtraq.org/advisories/_BSSADV-0001.txt
- http://www.securityfocus.com/archive/1/348366
- http://www.securityfocus.com/bid/9296
- https://exchange.xforce.ibmcloud.com/vulnerabilities/14079
- http://marc.info/?l=bugtraq&m=107247236124180&w=2
- http://www.bugtraq.org/advisories/_BSSADV-0001.txt
- http://www.securityfocus.com/archive/1/348366
- http://www.securityfocus.com/bid/9296
- https://exchange.xforce.ibmcloud.com/vulnerabilities/14079



