CVE-2006-2941
CVSS5.0
发布时间 :2006-09-05 20:04:00
修订时间 :2011-03-07 21:37:21
NMCOPS    

[原文]Mailman before 2.1.9rc1 allows remote attackers to cause a denial of service via unspecified vectors involving "standards-breaking RFC 2231 formatted headers".


[CNNVD]GNU Mailman 多个跨站脚本及拒绝服务漏洞(CNNVD-200609-019)

        GNU Mailman是一款开放源码的邮件列表管理系统。
        Mailman中存在多个安全漏洞,具体如下:
        1) 日志功能中的错误允许攻击者通过特制的URL向错误日志中注入欺骗性的日志消息。这可能诱骗管理员访问恶意的Web站点。
        2) Mailman在处理畸形MIME首部时没有遵循RFC 2231标准,可能导致拒绝服务。
        3) Mailman没有正确过滤某些用户输入,允许在用户浏览器会话中执行任意HTML和脚本代码。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:gnu:mailman:2.1.1:beta1GNU Mailman 2.1.1b1
cpe:/a:gnu:mailman:2.1.1GNU Mailman 2.1.1
cpe:/a:gnu:mailman:2.1.3GNU Mailman 2.1.3
cpe:/a:gnu:mailman:2.1.5GNU Mailman 2.1.5
cpe:/a:gnu:mailman:2.1.4GNU Mailman 2.1.4
cpe:/a:gnu:mailman:2.1GNU Mailman 2.1
cpe:/a:gnu:mailman:2.1.8GNU Mailman 2.1.8
cpe:/a:gnu:mailman:2.1.6GNU Mailman 2.1.6
cpe:/a:gnu:mailman:2.1.7GNU Mailman 2.1.7
cpe:/a:gnu:mailman:2.1b1GNU Mailman 2.1b1
cpe:/a:gnu:mailman:2.1.2GNU Mailman 2.1.2
cpe:/a:gnu:mailman:2.1.5.8GNU Mailman 2.1.5.8

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9912Mailman before 2.1.9rc1 allows remote attackers to cause a denial of service via unspecified vectors involving "standards-breaking RFC 2231 ...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2941
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200609-019
(官方数据源) CNNVD

- 其它链接及资源

http://svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923
(PATCH)  MISC  http://svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923
http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295
(PATCH)  CONFIRM  http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295
http://secunia.com/advisories/21732
(VENDOR_ADVISORY)  SECUNIA  21732
http://xforce.iss.net/xforce/xfdb/28732
(UNKNOWN)  XF  mailman-headers-dos(28732)
http://www.vupen.com/english/advisories/2006/3446
(UNKNOWN)  VUPEN  ADV-2006-3446
http://www.ubuntu.com/usn/usn-345-1
(UNKNOWN)  UBUNTU  USN-345-1
http://www.securityfocus.com/bid/19831
(UNKNOWN)  BID  19831
http://www.novell.com/linux/security/advisories/2006_25_sr.html
(UNKNOWN)  SUSE  SUSE-SR:2006:025
http://www.mandriva.com/security/advisories?name=MDKSA-2006:165
(UNKNOWN)  MANDRIVA  MDKSA-2006:165
http://securitytracker.com/id?1016808
(UNKNOWN)  SECTRACK  1016808
http://security.gentoo.org/glsa/glsa-200609-12.xml
(UNKNOWN)  GENTOO  GLSA-200609-12
http://secunia.com/advisories/22639
(VENDOR_ADVISORY)  SECUNIA  22639
http://secunia.com/advisories/22020
(VENDOR_ADVISORY)  SECUNIA  22020
http://secunia.com/advisories/22011
(VENDOR_ADVISORY)  SECUNIA  22011
http://secunia.com/advisories/21879
(VENDOR_ADVISORY)  SECUNIA  21879
http://secunia.com/advisories/21837
(VENDOR_ADVISORY)  SECUNIA  21837
http://secunia.com/advisories/21792
(VENDOR_ADVISORY)  SECUNIA  21792
http://rhn.redhat.com/errata/RHSA-2006-0600.html
(UNKNOWN)  REDHAT  RHSA-2006:0600
http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html
(UNKNOWN)  MLIST  [Mailman-Announce] 20060913 RELEASED: Mailman 2.1.9

- 漏洞信息

GNU Mailman 多个跨站脚本及拒绝服务漏洞
中危 资料不足
2006-09-05 00:00:00 2006-09-06 00:00:00
远程  
        GNU Mailman是一款开放源码的邮件列表管理系统。
        Mailman中存在多个安全漏洞,具体如下:
        1) 日志功能中的错误允许攻击者通过特制的URL向错误日志中注入欺骗性的日志消息。这可能诱骗管理员访问恶意的Web站点。
        2) Mailman在处理畸形MIME首部时没有遵循RFC 2231标准,可能导致拒绝服务。
        3) Mailman没有正确过滤某些用户输入,允许在用户浏览器会话中执行任意HTML和脚本代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        https://sourceforge.net/project/showfiles.php?group_id=103
        http://lwn.net/Alerts/198828/?format=printable

- 漏洞信息 (F50001)

Ubuntu Security Notice 345-1 (PacketStormID:F50001)
2006-09-14 00:00:00
Ubuntu  security.ubuntu.com
advisory,remote,web,arbitrary,vulnerability,xss
linux,ubuntu
CVE-2006-2941,CVE-2006-3636
[点击下载]

Ubuntu Security Notice USN-345-1 - Steve Alexander discovered that mailman did not properly handle attachments with special filenames. A remote user could exploit that to stop mail delivery until the server administrator manually cleaned these posts. Various cross site scripting vulnerabilities have been reported by Barry Warsaw. By using specially crafted email addresses, names, and similar arbitrary user-defined strings, a remote attacker could exploit this to run web script code in the list administrator's web browser. URLs logged to the error log file are now checked for invalid characters. Before, specially crafted URLs could inject arbitrary messages into the log.

=========================================================== 
Ubuntu Security Notice USN-345-1         September 13, 2006
mailman vulnerabilities
CVE-2006-2941, CVE-2006-3636
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  mailman                                  2.1.5-7ubuntu0.3

Ubuntu 5.10:
  mailman                                  2.1.5-8ubuntu2.3

Ubuntu 6.06 LTS:
  mailman                                  2.1.5-9ubuntu4.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Steve Alexander discovered that mailman did not properly handle
attachments with special filenames. A remote user could exploit that
to stop mail delivery until the server administrator manually cleaned
these posts. (CVE-2006-2941)

Various cross-site scripting vulnerabilities have been reported by
Barry Warsaw. By using specially crafted email addresses, names, and
similar arbitrary user-defined strings, a remote attacker could
exploit this to run web script code in the list administrator's
web browser. (CVE-2006-3636)

URLs logged to the error log file are now checked for invalid
characters. Before, specially crafted URLs could inject arbitrary
messages into the log.


Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3.diff.gz
      Size/MD5:   122672 040be0e94a3463829deda6255b81914c
    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3.dsc
      Size/MD5:      669 6533900d800881c5e5e97661592fe9b1
    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5.orig.tar.gz
      Size/MD5:  5745912 f5f56f04747cd4aff67427e7a45631af

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3_amd64.deb
      Size/MD5:  6610396 9e485ddc61fea15ffaacebeb176bc924

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3_i386.deb
      Size/MD5:  6610126 7a76e92c25d14c439141c243f807ac59

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3_powerpc.deb
      Size/MD5:  6617368 a0c258a612fc19b87f756dfd1b2f5604

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3.diff.gz
      Size/MD5:   124569 edd592fdc5d979588cfa307d80f389ee
    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3.dsc
      Size/MD5:      626 52ca3b4a7132ed400701b33a9d1fa07c
    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5.orig.tar.gz
      Size/MD5:  5745912 f5f56f04747cd4aff67427e7a45631af

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_amd64.deb
      Size/MD5:  6611062 4808daed20ff5871d0878041dc65c278

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_i386.deb
      Size/MD5:  6610402 bae1a8798cc5518e204ac418d4108330

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_powerpc.deb
      Size/MD5:  6617772 c397e9d02be876896f4c519da2965dce

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_sparc.deb
      Size/MD5:  6616692 9714c5ffcedced686d5d2224f373f63a

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1.diff.gz
      Size/MD5:   228878 efe29915311336eea806f75a489ae876
    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1.dsc
      Size/MD5:      628 61d4ee8cb059d6073c845c63ab9428a3
    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5.orig.tar.gz
      Size/MD5:  5745912 f5f56f04747cd4aff67427e7a45631af

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_amd64.deb
      Size/MD5:  6612630 20c59f9de0ad456f476d9222deaf232f

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_i386.deb
      Size/MD5:  6612422 b22f69ab0ad00a70cc4cf9526521ae02

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_powerpc.deb
      Size/MD5:  6620218 57752d37e3514f437bfbddd458203306

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_sparc.deb
      Size/MD5:  6618874 870ca284b9c208a8937ef2890506a93c
    

- 漏洞信息

28437
Mailman Malformed RFC 2231 Formatted Header DoS
Denial of Service
Loss of Availability
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-09-02 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.1.9rc1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

GNU Mailman Multiple Security Vulnerabilities
Unknown 19831
Yes No
2006-09-04 12:00:00 2006-12-15 07:48:00
Moritz Naumann is credited with the discovery of these vulnerabilities.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 sparc
Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 6.06 LTS sparc
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
SuSE SUSE Linux Enterprise SDK 9
SuSE SUSE Linux Enterprise SDK 10
SuSE SUSE Linux Enterprise Desktop 10
S.u.S.E. UnitedLinux 1.0
S.u.S.E. SuSE Linux Standard Server 8.0
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SUSE LINUX Retail Solution 8.0
S.u.S.E. SuSE Linux Open-Xchange 4.1
S.u.S.E. Open-Enterprise-Server 0
S.u.S.E. Novell Linux POS 9
S.u.S.E. Novell Linux Desktop 9
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Openexchange Server
S.u.S.E. Linux Desktop 1.0
rPath rPath Linux 1
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Desktop 4.0
RedHat Desktop 3.0
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
GNU Mailman 2.1.10 b1
GNU Mailman 2.1.8 rc1
GNU Mailman 2.1.7
GNU Mailman 2.1.6
GNU Mailman 2.1.5
+ Debian Linux 3.1 sparc
+ Debian Linux 3.1 s/390
+ Debian Linux 3.1 ppc
+ Debian Linux 3.1 mipsel
+ Debian Linux 3.1 mips
+ Debian Linux 3.1 m68k
+ Debian Linux 3.1 ia-64
+ Debian Linux 3.1 ia-32
+ Debian Linux 3.1 hppa
+ Debian Linux 3.1 arm
+ Debian Linux 3.1 amd64
+ Debian Linux 3.1 alpha
+ Debian Linux 3.1
+ Mandriva Linux Mandrake 10.1 x86_64
+ Mandriva Linux Mandrake 10.1
+ Red Hat Enterprise Linux AS 4
+ Red Hat Enterprise Linux AS 3
+ RedHat Enterprise Linux Desktop version 4
+ RedHat Enterprise Linux ES 4
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 4
+ RedHat Enterprise Linux WS 3
GNU Mailman 2.1.4
+ MandrakeSoft Corporate Server 3.0
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
GNU Mailman 2.1.3
GNU Mailman 2.1.2
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
GNU Mailman 2.1.1
+ RedHat Linux 9.0 i386
+ RedHat Linux 7.3 i686
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
GNU Mailman 2.1
GNU Mailman 2.0.14
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
GNU Mailman 2.0.13
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
GNU Mailman 2.0.12
GNU Mailman 2.0.11
+ Debian Linux 3.0
GNU Mailman 2.0.10
GNU Mailman 2.0.9
GNU Mailman 2.0.8
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ Conectiva Linux 6.0
+ Conectiva Linux 5.1
+ Conectiva Linux 5.0
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
- RedHat PowerTools 7.1
- RedHat PowerTools 7.0
GNU Mailman 2.0.7
GNU Mailman 2.0.6
GNU Mailman 2.0.5
+ Conectiva Linux 7.0
+ Conectiva Linux 6.0
+ Conectiva Linux 5.1
+ Conectiva Linux 5.0
+ Conectiva Linux 4.2
+ Conectiva Linux 4.1
- Debian Linux 2.2 sparc
- Debian Linux 2.2 powerpc
- Debian Linux 2.2 arm
- Debian Linux 2.2 alpha
- Debian Linux 2.2 68k
- Debian Linux 2.2
- FreeBSD FreeBSD 4.3
- HP HP-UX 11.11
- HP HP-UX 11.0
- HP HP-UX 10.20
- Mandriva Linux Mandrake 8.0
- Mandriva Linux Mandrake 7.2
- Mandriva Linux Mandrake 7.1
- NetBSD NetBSD 1.5.2
- NetBSD NetBSD 1.5.1
- OpenBSD OpenBSD 2.9
- OpenBSD OpenBSD 2.8
- OpenBSD OpenBSD 2.7
- RedHat Linux 7.1
- RedHat Linux 7.0
- S.u.S.E. Linux 7.2
- S.u.S.E. Linux 7.1
- S.u.S.E. Linux 7.0
- Slackware Linux 8.0
- Slackware Linux 7.1
- Slackware Linux 7.0
- Sun Solaris 8_sparc
- Sun Solaris 7.0
- Sun Solaris 2.6
GNU Mailman 2.0.4
GNU Mailman 2.0.4
GNU Mailman 2.0.3
GNU Mailman 2.0.2
GNU Mailman 2.0.1
GNU Mailman 2.0 beta5
+ RedHat Secure Web Server 3.2 i386
GNU Mailman 2.0 beta4
- BSDI BSD/OS 4.0
- Conectiva Linux 5.1
- Conectiva Linux 5.0
- Conectiva Linux 4.2
- Conectiva Linux 4.1
- Debian Linux 2.2
- Debian Linux 2.1
- Digital UNIX 4.0
- FreeBSD FreeBSD 5.0
- FreeBSD FreeBSD 4.0
- FreeBSD FreeBSD 3.5
- HP HP-UX 11.0
- HP HP-UX 10.20
- IBM AIX 4.3
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- NetBSD NetBSD 1.4.2 x86
- NetBSD NetBSD 1.4.1 x86
+ RedHat Secure Web Server 3.2 i386
+ RedHat Secure Web Server 3.1 sparc
+ RedHat Secure Web Server 3.1 i386
+ RedHat Secure Web Server 3.1 alpha
+ RedHat Secure Web Server 3.0 i386
- SGI IRIX 6.5
- Sun Solaris 8_sparc
- Sun Solaris 7.0
GNU Mailman 2.0 beta3
- BSDI BSD/OS 4.0
- Conectiva Linux 5.1
- Conectiva Linux 5.0
- Conectiva Linux 4.2
- Conectiva Linux 4.1
- Debian Linux 2.2
- Debian Linux 2.1
- Digital UNIX 4.0
- FreeBSD FreeBSD 5.0
- FreeBSD FreeBSD 4.0
- FreeBSD FreeBSD 3.5
- HP HP-UX 11.0
- HP HP-UX 10.20
- IBM AIX 4.3
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- NetBSD NetBSD 1.4.2 x86
- NetBSD NetBSD 1.4.1 x86
+ RedHat Secure Web Server 3.2 i386
+ RedHat Secure Web Server 3.1 sparc
+ RedHat Secure Web Server 3.1 i386
+ RedHat Secure Web Server 3.1 alpha
+ RedHat Secure Web Server 3.0 i386
- SGI IRIX 6.5
- Sun Solaris 8_sparc
- Sun Solaris 7.0
GNU Mailman 2.0 .8
GNU Mailman 2.0 .7
GNU Mailman 2.0 .6
+ RedHat Linux 7.2 i386
GNU Mailman 2.0 .5
GNU Mailman 2.0 .3
GNU Mailman 2.0 .2
GNU Mailman 2.0 .1
GNU Mailman 2.0
Gentoo Linux
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
GNU Mailman 2.1.9 rc1

- 不受影响的程序版本

GNU Mailman 2.1.9 rc1

- 漏洞讨论

Mailman is prone to multiple security vulnerabilities. The application fails to properly sanitize user-supplied input, and exhibits errors in MIME header handling and logging.

An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to cause a denial of service, and to inject spoofed log messages. This may help the attacker steal cookie-based authentication credentials, deny service to users, and launch other attacks.

These issues affect Mailman versions later than 2.0 and prior to 2.1.9rc1.

- 漏洞利用

Attackers can exploit these issues via a web client.

- 解决方案

The vendor has released version 2.1.9rc1 to address these issues.

Please see the references for more information.


GNU Mailman 2.1

GNU Mailman 2.1.1

GNU Mailman 2.1.10 b1

GNU Mailman 2.1.2

GNU Mailman 2.1.3

GNU Mailman 2.1.4

GNU Mailman 2.1.5

GNU Mailman 2.1.6

GNU Mailman 2.1.7

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站