7.6
CVSSv2

CVE-2015-2775

Published: 13/04/2015 Updated: 24/12/2016
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
VMScore: 676
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Directory traversal vulnerability in GNU Mailman prior to 2.1.20, when not using a static alias, allows remote malicious users to execute arbitrary files via a .. (dot dot) in a list name.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux 7.0

canonical ubuntu linux 14.10

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

debian debian linux 7.0

gnu mailman

Vendor Advisories

Mailman could be made to run programs if it processed a specially crafted list name ...
Debian Bug report logs - #781626 mailman: CVE-2015-2775: Path traversal vulnerability Package: src:mailman; Maintainer for src:mailman is Mailman for Debian <pkg-mailman-hackers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 31 Mar 2015 18:51:01 UTC Severity: important Tags ...
A path traversal vulnerability was discovered in Mailman, the mailing list manager Installations using a transport script (such as postfix-to-mailmanpy) to interface with their MTA instead of static aliases were vulnerable to a path traversal attack To successfully exploit this, an attacker needs write access on the local file system For the st ...
It was found that mailman did not sanitize the list name before passing it to certain MTAs A local attacker could use this flaw to execute arbitrary code as the user running mailman (CVE-2015-2775) It was found that mailman stored private email messages in a world-readable directory A local user could use this flaw to read private mailing list a ...
It was found that mailman did not sanitize the list name before passing it to certain MTAs A local attacker could use this flaw to execute arbitrary code as the user running mailman ...