Scientific Linux Security Update : mailman on SL4.x i386/x86_64

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing a security update.

Description :

A flaw was found in Mailman. A remote attacker could spoof messages in
the error log, and possibly trick the administrator into visiting
malicious URLs via a carriage return/line feed sequence in the URI.
(CVE-2006-4624)

As well, these updated packages fix the following bugs :

- canceling a subscription on the confirm subscription
request page caused mailman to crash.

- editing the sender filter caused all spam filter rules
to be deleted.

- the migrate-fhs script was not included.

- the mailman init script returned a zero (success) exit
code even when an incorrect command was given. For
example, the 'mailman foo' command returned a zero exit
code. In these updated packages the mailmain init script
returns the correct exit codes.

See also :

http://www.nessus.org/u?334bb9b0

Solution :

Update the affected mailman package.

Risk factor :

Low / CVSS Base Score : 2.6
(CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60303 ()

Bugtraq ID:

CVE ID: CVE-2006-4624