[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1GPVIC-0006ir-MQ@mercury.mandriva.com>
Date: Mon, 18 Sep 2006 20:25:00 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2006:165 ] - Updated mailman packages fix multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2006:165
http://www.mandriva.com/security/
_______________________________________________________________________
Package : mailman
Date : September 18, 2006
Affected: 2006.0, Corporate 3.0
_______________________________________________________________________
Problem Description:
A flaw was discovered in how Mailman handles MIME multipart messages
where an attacker could send a carefully-crafted MIME multipart
message to a Mailman-run mailing list causing that mailing list to
stop working (CVE-2006-2941).
As well, a number of XSS (cross-site scripting) issues were discovered
that could be exploited to perform XSS attacks against the Mailman
administrator (CVE-2006-3636).
Finally, a CRLF injection vulnerability allows remote attackers to
spoof messages in the error log (CVE-2006-4624).
Updated packages have been patched to address these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3636
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4624
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2006.0:
9979002d16562b3e62ceb6cfd21b45c6 2006.0/RPMS/mailman-2.1.6-6.4.20060mdk.i586.rpm
9b26c36c23c2a417df0d7772d97071ff 2006.0/SRPMS/mailman-2.1.6-6.4.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64:
2ea71bec743e2fd8ff33724f99a3e5e8 x86_64/2006.0/RPMS/mailman-2.1.6-6.4.20060mdk.x86_64.rpm
9b26c36c23c2a417df0d7772d97071ff x86_64/2006.0/SRPMS/mailman-2.1.6-6.4.20060mdk.src.rpm
Corporate 3.0:
2f43ed2ac1274394b252a1dca99cf825 corporate/3.0/RPMS/mailman-2.1.4-2.8.C30mdk.i586.rpm
c7f43a47a27a1a1a074af957b9262c43 corporate/3.0/SRPMS/mailman-2.1.4-2.8.C30mdk.src.rpm
Corporate 3.0/X86_64:
36c2945ad0699607b445f8df2df551d5 x86_64/corporate/3.0/RPMS/mailman-2.1.4-2.8.C30mdk.x86_64.rpm
c7f43a47a27a1a1a074af957b9262c43 x86_64/corporate/3.0/SRPMS/mailman-2.1.4-2.8.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFFDyhImqjQ0CJFipgRAqFsAJ9i+l+r6Yxi0FJcGnlSfrXnnCbsiACg02Pv
kQ8KrC6mgCKwm+DEpFDDqAk=
=OKMt
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists