How to Buy
This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote Scientific Linux host is missing a security update.
A flaw was found in Mailman. A remote attacker could spoof messages in
the error log, and possibly trick the administrator into visiting
malicious URLs via a carriage return/line feed sequence in the URI.
As well, these updated packages fix the following bugs :
- canceling a subscription on the confirm subscription
request page caused mailman to crash.
- editing the sender filter caused all spam filter rules
to be deleted.
- the migrate-fhs script was not included.
- the mailman init script returned a zero (success) exit
code even when an incorrect command was given. For
example, the 'mailman foo' command returned a zero exit
code. In these updated packages the mailmain init script
returns the correct exit codes.
See also :
Update the affected mailman package.
Risk factor :
Low / CVSS Base Score : 2.6
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60303 ()
CVE ID: CVE-2006-4624
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.