Description
The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.
Published: 2010-06-22
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
Link Providers
http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-0103.html cve-icon cve-icon
http://secunia.com/advisories/40307 cve-icon cve-icon
http://squirrelmail.org/security/issue/2010-06-21 cve-icon cve-icon
http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951 cve-icon cve-icon
http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951 cve-icon cve-icon
http://support.apple.com/kb/HT5130 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:120 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2010/05/25/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2010/05/25/9 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2010/06/21/1 cve-icon cve-icon
http://www.securityfocus.com/bid/40291 cve-icon cve-icon
http://www.securityfocus.com/bid/40307 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1535 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1536 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1554 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2010-1637 cve-icon
https://www.cve.org/CVERecord?id=CVE-2010-1637 cve-icon
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00175}

epss

{'score': 0.00128}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00123}

epss

{'score': 0.00175}


Subscriptions

Apple Mac Os X Mac Os X Server
Fedoraproject Fedora
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Server Enterprise Linux Workstation
Squirrelmail Squirrelmail
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T01:28:41.567Z

Reserved: 2010-04-29T00:00:00.000Z

Link: CVE-2010-1637

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-06-22T17:30:01.103

Modified: 2026-04-29T01:13:23.040

Link: CVE-2010-1637

cve-icon Redhat

Severity : Low

Publid Date: 2010-05-20T00:00:00Z

Links: CVE-2010-1637 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses