2.6 Low
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:N/I:P/A:N
mailman is vulnerable to phishing attacks. The vulnerability exists as a remote attacker could spoof messages in the error log, and possibly trick the administrator into visiting malicious URLs via a carriage return/line feed sequence in the URI.
mail.python.org/pipermail/mailman-announce/2006-September/000087.html
moritz-naumann.com/adv/0013/mailmanmulti/0013.txt
secunia.com/advisories/21732
secunia.com/advisories/22011
secunia.com/advisories/22020
secunia.com/advisories/22227
secunia.com/advisories/22639
secunia.com/advisories/27669
security.gentoo.org/glsa/glsa-200609-12.xml
sourceforge.net/project/shownotes.php?group_id=103&release_id=444295
svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923
www.debian.org/security/2006/dsa-1188
www.mandriva.com/security/advisories?name=MDKSA-2006:165
www.novell.com/linux/security/advisories/2006_25_sr.html
www.redhat.com/security/updates/classification/#low
www.redhat.com/support/errata/RHSA-2007-0779.html
www.securityfocus.com/archive/1/445992/100/0/threaded
www.securityfocus.com/bid/19831
www.securityfocus.com/bid/20021
www.vupen.com/english/advisories/2006/3446
access.redhat.com/errata/RHSA-2007:0779
exchange.xforce.ibmcloud.com/vulnerabilities/28734
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9756