[SECURITY] New versions of mailman fixes cookie attack

ID DEBIAN:0398320ADE6255FFEA99B72F3BE6E42D:69F7E
Type debian
Reporter Debian
Modified 1999-06-23T00:00:00


We have become aware that the version mailman as supplied in Debian GNU/Linux 2.1 has a problem with verifying list administrators. The problem is that the cookie value generation used was predictable, so using forged authentication cookies it was possible to access the list administration webpages without knowing the proper password. More information about this vulnerability can be found at http://www.python.org/pipermail/mailman-developers/1999-June/001128.html

This has been fixed in version 1.0rc2-5.

We recommend you upgrade your mailman package immediately.

wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

Debian GNU/Linux 2.1 alias slink

This version of Debian was released only for Intel, the Motorola 680x0, the alpha and the Sun sparc architecture.

Source archives: http://security.debian.org/dists/stable/updates/binary-source/mailman_1.0rc2-5.diff.gz MD5 checksum: 096d96ebf89341b148d2ae917037559a http://security.debian.org/dists/stable/updates/binary-source/mailman_1.0rc2-5.dsc MD5 checksum: a407c72b6d80163b04ddc5fb895b8fbd http://security.debian.org/dists/stable/updates/binary-source/mailman_1.0rc2.orig.tar.gz MD5 checksum: 6916959db9144ecaf004fcd9be32a020

Alpha architecture: http://security.debian.org/dists/stable/updates/binary-alpha/mailman_1.0rc2-5_alpha.deb MD5 checksum: 0f053b62d9dd51d4e2c0843258eee453

Intel ia32 architecture: http://security.debian.org/dists/stable/updates/binary-i386/mailman_1.0rc2-5_i386.deb MD5 checksum: d9b0f93458a41055ba1b39891e0a5ca5

Motorola 680x0 architecture: http://security.debian.org/dists/stable/updates/binary-m68k/mailman_1.0rc2-5_m68k.deb MD5 checksum: 94fc7996e4b296a4c944fe08ccb44503

Sun Sparc architecture: http://security.debian.org/dists/stable/updates/binary-sparc/mailman_1.0rc2-5_sparc.deb MD5 checksum: e27d100b24d0c87c02cc86b7aadded0d

These files will be copied into ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

Please note you can also use apt to always get the latest security updates. To do so add the following line to /etc/apt/sources.list:

deb http://security.debian.org/ stable updates

Debian GNU/Linux . Security Managers . security@debian.org debian-security-announce@lists.debian.org Christian Hudon . Wichert Akkerman . Martin Schulze <chrish@debian.org> . <wakkerma@debian.org> . <joey@debian.org>