Lucene search

K
mageiaGentoo FoundationMGASA-2015-0205
HistoryMay 11, 2015 - 11:10 p.m.

Updated mailman packages fix security vulnerabilities

2015-05-1123:10:38
Gentoo Foundation
advisories.mageia.org
1

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.031 Low

EPSS

Percentile

90.9%

Updated mailman packages fix security vulnerability: A path traversal vulnerability was discovered in Mailman. Installations using a transport script (such as postfix-to-mailman.py) to interface with their MTA instead of static aliases were vulnerable to a path traversal attack. To successfully exploit this, an attacker needs write access on the local file system (CVE-2015-2775).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchmailman< 2.1.20-1.1mailman-2.1.20-1.1.mga4

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.031 Low

EPSS

Percentile

90.9%