7.8
CVSSv2

CVE-2005-4153

Published: 11/12/2005 Updated: 11/10/2017
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Mailman 2.1.4 up to and including 2.1.6 allows remote malicious users to cause a denial of service via a message that causes the server to "fail with an Overflow on bad date data in a processed message," a different vulnerability than CVE-2005-3573.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu mailman 2.1.4

gnu mailman 2.1.5

gnu mailman 2.1.6

Vendor Advisories

Debian Bug report logs - #358892 Uncaught runner exception: len() of unsized object Package: mailman; Maintainer for mailman is Mailman for Debian <pkg-mailman-hackers@listsaliothdebianorg>; Source for mailman is src:mailman (PTS, buildd, popcon) Reported by: Sven Hartge <sven@svenhartgede> Date: Sat, 25 Mar 2006 ...
Aliet Santiesteban Sifontes discovered a remote Denial of Service vulnerability in the attachment handler An email with an attachment whose filename contained invalid UTF-8 characters caused mailman to crash (CVE-2005-3573) ...
Two denial of service bugs were found in the mailman list server In one, attachment filenames containing UTF8 strings were not properly parsed, which could cause the server to crash In another, a message containing a bad date string could cause a server crash The old stable distribution (woody) is not vulnerable to this issue For the stable dis ...