SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   Mailman Vendors:   GNU [multiple authors]
(Gentoo Issues Fix) Mailman Discloses Subscriber Passwords to Remote Users
SecurityTracker Alert ID:  1010436
SecurityTracker URL:  http://securitytracker.com/id/1010436
CVE Reference:   CVE-2004-0412   (Links to External Site)
Date:  Jun 9 2004
Impact:   Disclosure of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.1.x prior to 2.1.5
Description:   A vulnerability was reported in Mailman. A remote user may be able to obtain the password of another user.

The vendor reported that a remote user can send a specially crafted e-mail request to the mailman server to retrive the mailman password of a target mailman subscriber.

Impact:   A remote user may be able to retrieve the password of a target mailman subscriber.
Solution:   Gentoo has issued a fix and indicates that all users of Mailman should upgrade to the latest stable version:

# emerge sync

# emerge -pv ">=net-mail/mailman-2.1.5"
# emerge ">=net-mail/mailman-2.1.5"

Vendor URL:  mail.python.org/pipermail/mailman-announce/2004-May/000072.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Gentoo)

Message History:   This archive entry is a follow-up to the message listed below.
May 25 2004 Mailman Discloses Subscriber Passwords to Remote Users



 Source Message Contents

Subject:  [Full-Disclosure] [ GLSA 200406-04 ] Mailman: Member password disclosure vulnerability



--IS0zKkzwUGydFO0o
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200406-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: Mailman: Member password disclosure vulnerability
      Date: June 09, 2004
      Bugs: #51671
        ID: 200406-04

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Mailman contains a bug allowing 3rd parties to retrieve member
passwords.

Background
==========

Mailman is a python-based mailing list server with an extensive web
interface.

Affected packages
=================

    -------------------------------------------------------------------
     Package           /   Vulnerable   /                   Unaffected
    -------------------------------------------------------------------
  1  net-mail/mailman        < 2.1.5                          >= 2.1.5

Description
===========

Mailman contains an unspecified vulnerability in the handling of
request emails.

Impact
======

By sending a carefully crafted email request to the mailman server an
attacker could obtain member passwords.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All users of Mailman should upgrade to the latest stable version:

    # emerge sync

    # emerge -pv ">=net-mail/mailman-2.1.5"
    # emerge ">=net-mail/mailman-2.1.5"

References
==========

  [ 1 ] Mailman 2.1.5 Release Announcement
        http://mail.python.org/pipermail/mailman-announce/2004-May/000072.html
  [ 2 ] CAN-2004-0412
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0412

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

     http://security.gentoo.org/glsa/glsa-200406-04.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2004 Gentoo Technologies, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/1.0

--IS0zKkzwUGydFO0o
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAxt7yJPpRNiftIEYRAp+jAJsFOQeBRFviMO60yVvvx0VOyIo7YQCdGZHQ
jsFUV+hQbWvr0dD+tqlzt+4=
=mDgp
-----END PGP SIGNATURE-----

--IS0zKkzwUGydFO0o--

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC