blob: 096a063bf6200f0f75ff77d2b797f4a332d33c0c [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200609-12">
<title>Mailman: Multiple vulnerabilities</title>
Mailman has multiple vulnerable that can result in Denial of Service, log
file injection and XSS.
<product type="ebuild">mailman</product>
<announced>September 19, 2006</announced>
<revised>September 19, 2006: 01</revised>
<package name="net-mail/mailman" auto="yes" arch="*">
<unaffected range="ge">2.1.9_rc1</unaffected>
<vulnerable range="lt">2.1.9_rc1</vulnerable>
Mailman is a Python based mailing list server with an extensive web
Mailman fails to properly handle standards-breaking RFC 2231 formatted
headers. Furthermore, Moritz Naumann discovered several XSS
vulnerabilities and a log file injection.
<impact type="normal">
An attacker could exploit these vulnerabilities to cause Mailman to
stop processing mails, to inject content into the log file or to
execute arbitrary scripts running in the context of the administrator
or mailing list user's browser.
There is no known workaround at this time.
All Mailman users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailman-2.1.9_rc1&quot;</code>
<uri link="">CVE-2006-2941</uri>
<uri link="">CVE-2006-3636</uri>
<metadata tag="requester" timestamp="Thu, 14 Sep 2006 10:21:53 +0000">
<metadata tag="submitter" timestamp="Thu, 14 Sep 2006 16:20:16 +0000">
<metadata tag="bugReady" timestamp="Tue, 19 Sep 2006 07:26:33 +0000">