Vulnerability Details : CVE-2007-3634
Unspecified vulnerability in the G/PGP (GPG) Plugin 2.0 for Squirrelmail 1.4.10a allows remote authenticated users to execute arbitrary commands via unspecified vectors, possibly related to the passphrase variable in the gpg_sign_attachment function, aka ZD-00000004. this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine.
Products affected by CVE-2007-3634
- cpe:2.3:a:squirrelmail:gpg_plugin:2.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-3634
0.72%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 70 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-3634
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
Vendor statements for CVE-2007-3634
-
Red Hat 2007-07-10Not vulnerable. This plugin is not shipped with Squirrelmail in Red Hat Enterprise Linux.
References for CVE-2007-3634
-
http://www.securityfocus.com/bid/24782
Patch
-
http://www.wslabi.com/wabisabilabi/initPublishedBid.do?
-
http://lists.immunitysec.com/pipermail/dailydave/2007-July/004453.html
-
http://osvdb.org/45788
-
http://lists.immunitysec.com/pipermail/dailydave/2007-July/004448.html
-
http://www.attrition.org/pipermail/vim/2007-July/001703.html
-
http://lists.immunitysec.com/pipermail/dailydave/2007-July/004452.html
Jump to