Boletines de Vulnerabilidades |
Denegación de servicio en Mailman |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Denegación de Servicio |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio estandar |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricant afectat | GNU/Linux |
Software afectado | Mailman 2.1.4 - 2.1.6 |
Descripción |
|
Se ha descubierto una vulnerabilidad en Mailman desde la versión 2.1.4 hasta la 2.1.6. La vulnerabilidad reside en el script "Scrubber.py" que no maneja correctamente los nombres de ficheros adjuntos a un email que empleen el código de caracteres UTF8. Un atacante remoto podría causar una denegación de servicio mediante un fichero con un nombre especialmente diseñado codificado en UTF8. |
|
Solución |
|
Actualización de software Mandriva Mandrakelinux 10.1 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/mailman-2.1.5-7.5.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/mailman-2.1.5-7.5.101mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/mailman-2.1.5-7.5.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/mailman-2.1.5-7.5.101mdk.src.rpm Corporate Server 3.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/mailman-2.1.4-2.5.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/mailman-2.1.4-2.5.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/mailman-2.1.4-2.5.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/mailman-2.1.4-2.5.C30mdk.src.rpm Mandrivalinux LE2005 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/mailman-2.1.5-15.2.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/SRPMS/mailman-2.1.5-15.2.102mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/mailman-2.1.5-15.2.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/SRPMS/mailman-2.1.5-15.2.102mdk.src.rpm Mandrivalinux 2006 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/mailman-2.1.6-6.2.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/mailman-2.1.6-6.2.20060mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/mailman-2.1.6-6.2.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/SRPMS/mailman-2.1.6-6.2.20060mdk.src.rpm Debian Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1.dsc http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1.diff.gz http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_alpha.deb AMD64 http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_amd64.deb ARM http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_ia64.deb HP Precision http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/m/mailman/mailman_2.1.5-8sarge1_sparc.deb Red Hat Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) https://rhn.redhat.com/ SGI Advanced Linux Environment 3 / RPM / Patch 10291 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS Advanced Linux Environment 3 / SRPM / Patch 10291 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CVE-2005-3573 |
BID | 15408 |
Recursos adicionales |
|
Mandriva Security Advisory (MDKSA-2005:222) http://www.mandriva.com/security/advisories?name=MDKSA-2005:222 Debian Security Advisory (DSA 955-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00029.html Red Hat Security Advisory (RHSA-2006:0204-10) https://rhn.redhat.com/errata/RHSA-2006-0204.html SGI Security Advisory (20060401-01-U) ftp://patches.sgi.com/support/free/security/advisories/20060401-01.U.asc |
Histórico de versiones |
||
Versión | Comentario | Data |
1.0 | Aviso emitido | 2005-12-05 |
1.1 | Aviso emitido por Debian (DSA 955-1) | 2006-01-26 |
1.2 | Aviso emitido por Red Hat (RHSA-2006:0204-10) | 2006-03-08 |
1.3 | Aviso emitido por SGI (20060401-01-U) | 2006-04-05 |