summaryrefslogtreecommitdiff
path: root/metadata/glsa/glsa-200609-12.xml
blob: a057c3f7ccf18b7109b3081e78f1f04688629816 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200609-12">
  <title>Mailman: Multiple vulnerabilities</title>
  <synopsis>
    Mailman has multiple vulnerable that can result in Denial of Service, log
    file injection and XSS.
  </synopsis>
  <product type="ebuild">mailman</product>
  <announced>2006-09-19</announced>
  <revised count="01">2006-09-19</revised>
  <bug>139976</bug>
  <access>remote</access>
  <affected>
    <package name="net-mail/mailman" auto="yes" arch="*">
      <unaffected range="ge">2.1.9_rc1</unaffected>
      <vulnerable range="lt">2.1.9_rc1</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Mailman is a Python based mailing list server with an extensive web
    interface.
    </p>
  </background>
  <description>
    <p>
    Mailman fails to properly handle standards-breaking RFC 2231 formatted
    headers. Furthermore, Moritz Naumann discovered several XSS
    vulnerabilities and a log file injection.
    </p>
  </description>
  <impact type="normal">
    <p>
    An attacker could exploit these vulnerabilities to cause Mailman to
    stop processing mails, to inject content into the log file or to
    execute arbitrary scripts running in the context of the administrator
    or mailing list user's browser.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All Mailman users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=net-mail/mailman-2.1.9_rc1"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941">CVE-2006-2941</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3636">CVE-2006-3636</uri>
  </references>
  <metadata tag="requester" timestamp="2006-09-14T10:21:53Z">
    jaervosz
  </metadata>
  <metadata tag="submitter" timestamp="2006-09-14T16:20:16Z">
    jaervosz
  </metadata>
  <metadata tag="bugReady" timestamp="2006-09-19T07:26:33Z">
    jaervosz
  </metadata>
</glsa>