Korean
<< Back
VID 21973
Severity 20
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Mailman software is vulnerable to a log spoofing vulnerability via the error log. Mailman is a open-source mailing list manager with strong Web functionality for Linux-based operating systems. GNU Mailman versions prior to 2.1.9 rc1 are vulnerable to a log spoofing vulnerability via the error in the logging function. A remote attacker could exploit this vulnerability by injecting a spoofed log message in the error log using a specially-crafted URL and persuading a potential victim to visit the site.

* References:
http://www.frsirt.com/english/advisories/2006/3446
http://www.gnu.org/software/mailman/
http://secunia.com/advisories/21732/
https://sourceforge.net/project/shownotes.php?release_id=444295&group_id=103
http://mail.python.org/pipermail/mailman-announce/2006-September/000086.html

* Platforms Affected:
GNU Project, GNU Mailman versions prior to 2.1.9 rc1
Linux Any version
Recommendation Upgrade to the latest version of GNU Mailman (2.1.9 rc1 or later), available from the SourceForge.net Download Web site at https://sourceforge.net/project/showfiles.php?group_id=103
Related URL CVE-2006-4624 (CVE)
Related URL 19831,20021 (SecurityFocus)
Related URL 28734 (ISS)