Debian Security Advisory
DSA-1188-1 mailman -- format string
- Date Reported:
- 04 Oct 2006
- Affected Packages:
- mailman
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 19831.
In Mitre's CVE dictionary: CVE-2006-3636, CVE-2006-4624. - More information:
-
Several security related problems have been discovered in mailman, the web-based GNU mailing list manager. The Common Vulnerabilities and Exposures project identifies the following problems:
- CVE-2006-3636
Moritz Naumann discovered several cross-site scripting problems that could allow remote attackers to inject arbitrary web script code or HTML.
- CVE-2006-4624
Moritz Naumann discovered that a remote attacker can inject arbitrary strings into the logfile.
For the stable distribution (sarge) these problems have been fixed in version 2.1.5-8sarge5.
For the unstable distribution (sid) these problems have been fixed in version 2.1.8-3.
We recommend that you upgrade your mailman package.
- CVE-2006-3636
- Fixed in:
-
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5.dsc
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5.diff.gz
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5.orig.tar.gz
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_arm.deb
- HPPA:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_ia64.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_sparc.deb
MD5 checksums of the listed files are available in the original advisory.