FreeBSD : mailman -- Multiple Vulnerabilities (fffa9257-3c17-11db-86ab-00123ffe8333)

High Nessus Plugin ID 22304


The remote FreeBSD host is missing one or more security-related updates.


Secunia reports :

Mailman can be exploited by malicious people to conduct cross-site scripting and phishing attacks, and cause a DoS (Denial of Service).

1) An error in the logging functionality can be exploited to inject a spoofed log message into the error log via a specially crafted URL.

Successful exploitation may trick an administrator into visiting a malicious website.

2) An error in the processing of malformed headers which does not follow the RFC 2231 standard can be exploited to cause a DoS (Denial of Service).

3) Some unspecified input isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 22304

File Name: freebsd_pkg_fffa92573c1711db86ab00123ffe8333.nasl

Version: $Revision: 1.16 $

Type: local

Published: 2006/09/05

Modified: 2016/05/05

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ja-mailman, p-cpe:/a:freebsd:freebsd:mailman, p-cpe:/a:freebsd:freebsd:mailman-with-htdig, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2006/09/04

Vulnerability Publication Date: 2006/06/09

Reference Information

CVE: CVE-2006-2191, CVE-2006-2941, CVE-2006-3636, CVE-2006-4624

BID: 19831

Secunia: 21732

CWE: 94