Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Fedora Core 2 Update: mailman-2.1.5-8.fc2 Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Fedora There is a critical security flaw in Mailman 2.1.5 which will allow attackers to read arbitrary files.
Fedora Update Notification

Product     : Fedora Core 2
Name        : mailman
Version     : 2.1.5                      
Release     : 8.fc2                  
Summary     : Mailing list manager with built in Web access.
Description :
Mailman is software to help manage email discussion lists, much like
Majordomo and Smartmail. Unlike most similar products, Mailman gives
each mailing list a webpage, and allows users to subscribe,
unsubscribe, etc. over the Web. Even the list manager can administer
his or her list entirely from the Web. Mailman also integrates most
things people want to do with mailing lists, including archiving, mail
<-> news gateways, and so on.

Documentation can be found in: /usr/share/doc/mailman-2.1.5

Update Information:

There is a critical security flaw in Mailman 2.1.5 which will allow
attackers to read arbitrary files.

The extent of the vulnerability depends on what version of Apache
(httpd) you are running, and (possibly) how you have configured your
web server. It is believed the vulnerability is not available when
Mailman is paired with a version of Apache >= 2.0, however earlier
versions of Apache, e.g. version 1.3, will allow the exploit when
executing a Mailman CGI script. All versions of Fedora have shipped
with the later 2.0 version of Apache and thus if you are running a
Fedora release you are not likely to be vulnerable to the exploit
unless you have explicitly downgraded the version of your web
server. However, installing this version of mailman with a security
patch represents a prudent safeguard.

This issue has been assigned CVE number CAN-2005-0202.

The bug report associated with this is:

The errata associated with this for RHEL releases is:

For additional piece of mind, it is recommended that you regenerate
your list member passwords.  Instructions on how to do this, and more
information about this vulnerability are available here:

* Tue Feb 08 2005 John Dennis  - 3:2.1.5-8.fc2

- fix security vulnerability CAN-2005-0202, errata RHSA-2005:136, bug #147343

This update can be downloaded from:

4664674e6a2f8cf94457f87541f6fdee  SRPMS/mailman-2.1.5-8.fc2.src.rpm
c66f11090b5c284d5e5d0b804e844788  x86_64/mailman-2.1.5-8.fc2.x86_64.rpm
9f79a60e105043526ea9fe0b951c4310  x86_64/debug/mailman-debuginfo-2.1.5-8.fc2.x86_64.rpm
c9537949ed7ee6c9a96316d72277bbe4  i386/mailman-2.1.5-8.fc2.i386.rpm
52e1f9a0ec60bc34c84f52f8442355ac  i386/debug/mailman-debuginfo-2.1.5-8.fc2.i386.rpm

This update can also be installed with the Update Agent; you can
launch the Update Agent with the 'up2date' command.  

John Dennis 

fedora-announce-list mailing list
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Tech Companies, Privacy Advocates Call for NSA Reform
Google warns of unauthorized TLS certificates trusted by almost all OSes
How Kevin Mitnick hacked the audience at CeBIT 2015
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.