[Full-disclosure] [USN-347-1] Linux kernel vulnerabilities

2006-09-19T00:00:00
ID SECURITYVULNS:DOC:14314
Type securityvulns
Reporter Securityvulns
Modified 2006-09-19T00:00:00

Description

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1


Mandriva Linux Security Advisory MDKSA-2006:165 http://www.mandriva.com/security/


Package : mailman Date : September 18, 2006 Affected: 2006.0, Corporate 3.0


Problem Description:

A flaw was discovered in how Mailman handles MIME multipart messages where an attacker could send a carefully-crafted MIME multipart message to a Mailman-run mailing list causing that mailing list to stop working (CVE-2006-2941).

As well, a number of XSS (cross-site scripting) issues were discovered that could be exploited to perform XSS attacks against the Mailman administrator (CVE-2006-3636).

Finally, a CRLF injection vulnerability allows remote attackers to spoof messages in the error log (CVE-2006-4624).

Updated packages have been patched to address these issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3636 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4624


Updated Packages:

Mandriva Linux 2006.0: 9979002d16562b3e62ceb6cfd21b45c6 2006.0/RPMS/mailman-2.1.6-6.4.20060mdk.i586.rpm 9b26c36c23c2a417df0d7772d97071ff 2006.0/SRPMS/mailman-2.1.6-6.4.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64: 2ea71bec743e2fd8ff33724f99a3e5e8 x86_64/2006.0/RPMS/mailman-2.1.6-6.4.20060mdk.x86_64.rpm 9b26c36c23c2a417df0d7772d97071ff x86_64/2006.0/SRPMS/mailman-2.1.6-6.4.20060mdk.src.rpm

Corporate 3.0: 2f43ed2ac1274394b252a1dca99cf825 corporate/3.0/RPMS/mailman-2.1.4-2.8.C30mdk.i586.rpm c7f43a47a27a1a1a074af957b9262c43 corporate/3.0/SRPMS/mailman-2.1.4-2.8.C30mdk.src.rpm

Corporate 3.0/X86_64: 36c2945ad0699607b445f8df2df551d5 x86_64/corporate/3.0/RPMS/mailman-2.1.4-2.8.C30mdk.x86_64.rpm c7f43a47a27a1a1a074af957b9262c43 x86_64/corporate/3.0/SRPMS/mailman-2.1.4-2.8.C30mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFDyhImqjQ0CJFipgRAqFsAJ9i+l+r6Yxi0FJcGnlSfrXnnCbsiACg02Pv kQ8KrC6mgCKwm+DEpFDDqAk= =OKMt -----END PGP SIGNATURE-----


Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/