Scientific Linux Security Update : mailman on SL4.x i386/x86_64

low Nessus Plugin ID 60303

Synopsis

The remote Scientific Linux host is missing a security update.

Description

A flaw was found in Mailman. A remote attacker could spoof messages in the error log, and possibly trick the administrator into visiting malicious URLs via a carriage return/line feed sequence in the URI.
(CVE-2006-4624)

As well, these updated packages fix the following bugs :

- canceling a subscription on the confirm subscription request page caused mailman to crash.

- editing the sender filter caused all spam filter rules to be deleted.

- the migrate-fhs script was not included.

- the mailman init script returned a zero (success) exit code even when an incorrect command was given. For example, the 'mailman foo' command returned a zero exit code. In these updated packages the mailmain init script returns the correct exit codes.

Solution

Update the affected mailman package.

See Also

http://www.nessus.org/u?224cd51c

Plugin Details

Severity: Low

ID: 60303

File Name: sl_20071115_mailman_on_SL4_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: Low

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 11/15/2007

Reference Information

CVE: CVE-2006-4624

CWE: 94