FreeBSD : mailman -- directory traversal vulnerability (c7ccc33f-7d31-11d9-a9e7-0001020eed82)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A directory traversal vulnerability in mailman allow remote attackers
to read arbitrary files due to inadequate input sanitizing. This
could, among other things, lead remote attackers to gaining access to
the mailman configuration database (which contains subscriber email
addresses and passwords) or to the mail archives for private lists.

See also :

http://marc.info/?l=full-disclosure&m=110797575304304
http://www.nessus.org/u?ba04adca

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 19117 (freebsd_pkg_c7ccc33f7d3111d9a9e70001020eed82.nasl)

Bugtraq ID:

CVE ID: CVE-2005-0202

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now