int(5386)

Vulnerability Bulletins


Salto de directorio en mlmmj (Mailing List Managing Made Joyful)

Vulnerability classification

Property Value
Confidence level Oficial
Impact Integridad
Dificulty Experto
Required attacker level Acceso remoto con cuenta

System information

Property Value
Affected manufacturer GNU/Linux
Affected software mlmmj

Description

Se ha descubierto una vulnerabilidad de salto de directorio en
Mailing List Managing Made Joyful. La vulnerabilidad reside en el gestor de listas de correo, a la hora de validar los datos de peticiones de usuarios en la interfaz web.

Un atacante remoto podría sobreescribir o eliminar ficheros arbitrarios mediante métodos no especificados.

Solution



Actualización de software

Debian (DSA 2073-1)

Debian Linux 5.0
Source
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15.orig.tar.gz
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1.dsc
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1.diff.gz
independent packages:
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj-php-web_1.2.15-1.1+lenny1_all.deb
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj-php-web-admin_1.2.15-1.1+lenny1_all.deb
alpha (DEC Alpha)
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1_alpha.deb
amd64 (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1_amd64.deb
arm (ARM)
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1_arm.deb
armel (ARM EABI)
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1_armel.deb
hppa (HP PA RISC)
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1_hppa.deb
i386 (Intel ia32)
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1_i386.deb
ia64 (Intel ia64)
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1_ia64.deb
mips (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1_mips.deb
mipsel (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1_mipsel.deb
powerpc (PowerPC)
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1_powerpc.deb
s390 (IBM S/390)
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1_s390.deb
sparc (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/m/mlmmj/mlmmj_1.2.15-1.1+lenny1_sparc.deb
Size/MD5 checksum: 155724 da07375aafb78c34e37817551deef50b

Standar resources

Property Value
CVE CVE-2009-4896
BID

Other resources

Debian Security Advisory (DSA 2073-1)
http://lists.debian.org/debian-security-announce/2010/msg00118.html

Version history

Version Comments Date
1.0 Aviso emitido 2010-07-29
Ministerio de Defensa
CNI
CCN
CCN-CERT