{
  "threat_severity" : "Moderate",
  "public_date" : "2009-08-12T00:00:00Z",
  "bugzilla" : {
    "description" : "squirrelmail: CSRF issues in all forms",
    "id" : "517312",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=517312"
  },
  "cvss" : {
    "cvss_base_score" : "4.3",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-352",
  "details" : [ "Multiple cross-site request forgery (CSRF) vulnerabilities in SquirrelMail 1.4.19 and earlier, and NaSMail before 1.7, allow remote attackers to hijack the authentication of unspecified victims via features such as send message and change preferences, related to (1) functions/mailbox_display.php, (2) src/addrbook_search_html.php, (3) src/addressbook.php, (4) src/compose.php, (5) src/folders.php, (6) src/folders_create.php, (7) src/folders_delete.php, (8) src/folders_rename_do.php, (9) src/folders_rename_getname.php, (10) src/folders_subscribe.php, (11) src/move_messages.php, (12) src/options.php, (13) src/options_highlight.php, (14) src/options_identities.php, (15) src/options_order.php, (16) src/search.php, and (17) src/vcard.php." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 3",
    "release_date" : "2009-10-08T00:00:00Z",
    "advisory" : "RHSA-2009:1490",
    "cpe" : "cpe:/o:redhat:enterprise_linux:3",
    "package" : "squirrelmail-0:1.4.8-16.el3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2009-10-08T00:00:00Z",
    "advisory" : "RHSA-2009:1490",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "squirrelmail-0:1.4.8-5.el4_8.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2009-10-08T00:00:00Z",
    "advisory" : "RHSA-2009:1490",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "squirrelmail-0:1.4.8-5.el5_4.10"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2009-2964\nhttps://nvd.nist.gov/vuln/detail/CVE-2009-2964" ],
  "name" : "CVE-2009-2964",
  "csaw" : false
}