DSA-955-1 mailman -- DoS

Related Vulnerabilities: CVE-2005-3573   CVE-2005-4153  

Two denial of service bugs were found in the mailman list server. In one, attachment filenames containing UTF8 strings were not properly parsed, which could cause the server to crash. In another, a message containing a bad date string could cause a server crash. The old stable distribution (woody) is not vulnerable to this issue. For the stable distribution (sarge) this problem has been fixed in version 2.1.5-8sarge1. For the unstable distribution (sid) this problem has been fixed in version 2.1.5-10. We recommend that you upgrade your mailman package immediately.

Debian Security Advisory

DSA-955-1 mailman -- DoS

Date Reported:
25 Jan 2006
Affected Packages:
mailman
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 339095, Bug 326024, Bug 327732.
In Mitre's CVE dictionary: CVE-2005-3573, CVE-2005-4153.
More information:

Two denial of service bugs were found in the mailman list server. In one, attachment filenames containing UTF8 strings were not properly parsed, which could cause the server to crash. In another, a message containing a bad date string could cause a server crash.

The old stable distribution (woody) is not vulnerable to this issue.

For the stable distribution (sarge) this problem has been fixed in version 2.1.5-8sarge1.

For the unstable distribution (sid) this problem has been fixed in version 2.1.5-10.

We recommend that you upgrade your mailman package immediately.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1.dsc
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1.diff.gz
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_sparc.deb

MD5 checksums of the listed files are available in the original advisory.