DSA-1188-1 mailman -- format string

Related Vulnerabilities: CVE-2006-3636   CVE-2006-4624  

Several security related problems have been discovered in mailman, the web-based GNU mailing list manager. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-3636 Moritz Naumann discovered several cross-site scripting problems that could allow remote attackers to inject arbitrary web script code or HTML. CVE-2006-4624 Moritz Naumann discovered that a remote attacker can inject arbitrary strings into the logfile. For the stable distribution (sarge) these problems have been fixed in version 2.1.5-8sarge5. For the unstable distribution (sid) these problems have been fixed in version 2.1.8-3. We recommend that you upgrade your mailman package.

Debian Security Advisory

DSA-1188-1 mailman -- format string

Date Reported:
04 Oct 2006
Affected Packages:
mailman
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 19831.
In Mitre's CVE dictionary: CVE-2006-3636, CVE-2006-4624.
More information:

Several security related problems have been discovered in mailman, the web-based GNU mailing list manager. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2006-3636

    Moritz Naumann discovered several cross-site scripting problems that could allow remote attackers to inject arbitrary web script code or HTML.

  • CVE-2006-4624

    Moritz Naumann discovered that a remote attacker can inject arbitrary strings into the logfile.

For the stable distribution (sarge) these problems have been fixed in version 2.1.5-8sarge5.

For the unstable distribution (sid) these problems have been fixed in version 2.1.8-3.

We recommend that you upgrade your mailman package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5.dsc
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5.diff.gz
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_arm.deb
HPPA:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_ia64.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge5_sparc.deb

MD5 checksums of the listed files are available in the original advisory.