Back to list
SECURITY: 1.4.12 Package Compromise
Dec 13 2007 04:49PM
Jon Angliss (jon squirrelmail org)
-----BEGIN PGP SIGNED MESSAGE-----
It has been brought to our attention that the MD5 sums for the 1.4.12
package were not matching the actual package. We've been
investigating this issue, and uncovered that the package was modified
post release. This was believed to have been caused by a compromised
account from one of our release maintainers.
Further investigations show that the modifications to the code should
have little to no impact at this time. Modifications seemed to be
based around a PHP global variable which we cannot track down. The
changes made will most likely generate an error, rather than a
compromise of a system in the event the code does get executed.
Original packages, stored on secure media, have been restored to the
Sourceforge download servers, and additional signatures for the
packages are now available on the SquirrelMail download page at
While we believe the changes made should have little impact, we
strongly recommend everybody that has downloaded the 1.4.12 package
after the 8th December, to redownload the package.
The code modifications did not made it into our source control, just
the final package. We are currently investigating older packages to
see if they were also compromised.
Once again, the original package MD5s are:
We apologies for the inconvenience this may have caused.
For any further issues, please contact myself, or the security list
security (at) squirrelmail (dot) org [email concealed]
The SquirrelMail Development Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (MingW32)
-----END PGP SIGNATURE-----
[ reply ]
Copyright 2010, SecurityFocus