Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (E-mail Server)  >   LISTSERV Vendors:   L-Soft
LISTSERV Web Archive Interface Unspecified Bugs Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1015722
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Updated:  Mar 7 2006
Original Entry Date:  Mar 4 2006
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 14.3, 14.4; possibly prior versions
Description:   A vulnerability was reported in LISTSERV. A remote user can execute arbitrary code on the target system.

Systems that have the web archive interface installed are affected.

A remote user can trigger a buffer overflow and cause arbitrary code to be executed on the target system hosting the LISTSERV archive web interface.

Technical details will be disclosed in June 2006.

Peter Winter-Smith of NGSSoftware discovered these vulnerabilities.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fixed version (14.5), available at:

The vendor's notice is available at:

Vendor URL: (Links to External Site)
Cause:   Boundary error

Message History:   None.

 Source Message Contents

Subject:  Critical Risk Vulnerability in L-Soft Listserv

Peter Winter-Smith of NGSSoftware has discovered a number of vulnerabilities
in L-Soft's LISTSERV list management system. The worst of these carries a
critical risk rating.

Affected versions include:

- LISTSERV version 14.4, including LISTSERV Lite and HPO
- LISTSERV version 14.3, including LISTSERV Lite and HPO

And possibly all prior versions of LISTSERV which are installed with the web
archive interface, which is currently the default installation behaviour.

The vulnerabilities which have been fixed can, in the worst of cases, allow
a remote unauthenticated attacker to execute arbitrary code on the system
hosting the LISTSERV archive web interface.

This issue has been resolved in the latest release of L-Soft LISTSERV
(version 14.5), which may be downloaded from:

NGSSoftware are going to withhold details of this flaw for three months.
Full details will be published on the 3rd June 2006. This three month
window will allow users of L-Soft's LISTSERV the time needed to apply the
patch before the details are released to the general public. This reflects
NGSSoftware's approach to responsible disclosure.

NGSSoftware Insight Security Research
+44(0)208 401 0070


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC