| VID |
21973 |
| Severity |
20 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Mailman software is vulnerable to a log spoofing vulnerability via the error log. Mailman is a open-source mailing list manager with strong Web functionality for Linux-based operating systems. GNU Mailman versions prior to 2.1.9 rc1 are vulnerable to a log spoofing vulnerability via the error in the logging function. A remote attacker could exploit this vulnerability by injecting a spoofed log message in the error log using a specially-crafted URL and persuading a potential victim to visit the site.
* References: http://www.frsirt.com/english/advisories/2006/3446 http://www.gnu.org/software/mailman/ http://secunia.com/advisories/21732/ https://sourceforge.net/project/shownotes.php?release_id=444295&group_id=103 http://mail.python.org/pipermail/mailman-announce/2006-September/000086.html
* Platforms Affected: GNU Project, GNU Mailman versions prior to 2.1.9 rc1 Linux Any version |
| Recommendation |
Upgrade to the latest version of GNU Mailman (2.1.9 rc1 or later), available from the SourceForge.net Download Web site at https://sourceforge.net/project/showfiles.php?group_id=103 |
| Related URL |
CVE-2006-4624 (CVE) |
| Related URL |
19831,20021 (SecurityFocus) |
| Related URL |
28734 (ISS) |
|