Debian Security Advisory
DSA-436-1 mailman -- several vulnerabilities
- Date Reported:
- 08 Feb 2004
- Affected Packages:
- mailman
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 9336, BugTraq ID 9620.
In Mitre's CVE dictionary: CVE-2003-0991, CVE-2003-0965, CVE-2003-0038. - More information:
-
Several vulnerabilities have been fixed in the mailman package:
- CAN-2003-0038 - potential cross-site scripting via certain CGI parameters (not known to be exploitable in this version)
- CAN-2003-0965 - cross-site scripting in the administrative interface
- CAN-2003-0991 - certain malformed email commands could cause the mailman process to crash
The cross-site scripting vulnerabilities could allow an attacker to perform administrative operations without authorization, by stealing a session cookie.
For the current stable distribution (woody) these problems have been fixed in version 2.0.11-1woody7.
For the unstable distribution (sid), CAN-2003-0965 is fixed in version 2.1.4-1, and CAN-2003-0038 in version 2.1.1-1. CAN-2003-0991 will be fixed soon.
We recommend that you update your mailman package.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8.dsc
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8.diff.gz
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11.orig.tar.gz
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_sparc.deb
MD5 checksums of the listed files are available in the original advisory.
MD5 checksums of the listed files are available in the revised advisory.