Lucene search

K
freebsdFreeBSDFFFA9257-3C17-11DB-86AB-00123FFE8333
HistoryJun 09, 2006 - 12:00 a.m.

mailman -- Multiple Vulnerabilities

2006-06-0900:00:00
vuxml.freebsd.org
12

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.321 Low

EPSS

Percentile

97.0%

Secunia reports:

Mailman can be exploited by malicious people to conduct cross-site
scripting and phishing attacks, and cause a DoS (Denial of
Service).

  1. An error in the logging functionality can be exploited to
    inject a spoofed log message into the error log via a specially
    crafted URL.
    Successful exploitation may trick an administrator into visiting
    a malicious web site.
  2. An error in the processing of malformed headers which does not
    follow the RFC 2231 standard can be exploited to cause a DoS
    (Denial of Service).
  3. Some unspecified input isn’t properly sanitised before being
    returned to the user. This can be exploited to execute arbitrary
    HTML and script code in a user’s browser session in context of an
    affected site.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchmailman< 2.1.9.r1UNKNOWN
FreeBSDanynoarchja-mailman< 2.1.9.r1UNKNOWN
FreeBSDanynoarchmailman-with-htdig< 2.1.9.r1UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.321 Low

EPSS

Percentile

97.0%