Mandriva Linux Security Advisory : mailman (MDVSA-2011:036)

Medium Nessus Plugin ID 52160

Synopsis

The remote Mandriva Linux host is missing a security update.

Description

A vulnerability has been found and corrected in mailman :

Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message (CVE-2011-0707).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149 products_id=490

The updated packages have been patched to correct this issue.

Solution

Update the affected mailman package.

Plugin Details

Severity: Medium

ID: 52160

File Name: mandriva_MDVSA-2011-036.nasl

Version: 1.12

Type: local

Published: 2011/02/24

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:mailman, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2010.0, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/02/23

Reference Information

CVE: CVE-2011-0707

BID: 46464

MDVSA: 2011:036