DSA-436-1 mailman -- several vulnerabilities

Related Vulnerabilities: CVE-2003-0991   CVE-2003-0965   CVE-2003-0038  

Several vulnerabilities have been fixed in the mailman package: CAN-2003-0038 - potential cross-site scripting via certain CGI parameters (not known to be exploitable in this version) CAN-2003-0965 - cross-site scripting in the administrative interface CAN-2003-0991 - certain malformed email commands could cause the mailman process to crash The cross-site scripting vulnerabilities could allow an attacker to perform administrative operations without authorization, by stealing a session cookie. For the current stable distribution (woody) these problems have been fixed in version 2.0.11-1woody7. For the unstable distribution (sid), CAN-2003-0965 is fixed in version 2.1.4-1, and CAN-2003-0038 in version 2.1.1-1. CAN-2003-0991 will be fixed soon. We recommend that you update your mailman package.

Debian Security Advisory

DSA-436-1 mailman -- several vulnerabilities

Date Reported:
08 Feb 2004
Affected Packages:
mailman
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 9336, BugTraq ID 9620.
In Mitre's CVE dictionary: CVE-2003-0991, CVE-2003-0965, CVE-2003-0038.
More information:

Several vulnerabilities have been fixed in the mailman package:

  • CAN-2003-0038 - potential cross-site scripting via certain CGI parameters (not known to be exploitable in this version)
  • CAN-2003-0965 - cross-site scripting in the administrative interface
  • CAN-2003-0991 - certain malformed email commands could cause the mailman process to crash

The cross-site scripting vulnerabilities could allow an attacker to perform administrative operations without authorization, by stealing a session cookie.

For the current stable distribution (woody) these problems have been fixed in version 2.0.11-1woody7.

For the unstable distribution (sid), CAN-2003-0965 is fixed in version 2.1.4-1, and CAN-2003-0038 in version 2.1.1-1. CAN-2003-0991 will be fixed soon.

We recommend that you update your mailman package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8.dsc
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8.diff.gz
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody8_sparc.deb

MD5 checksums of the listed files are available in the original advisory.

MD5 checksums of the listed files are available in the revised advisory.