LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 24th, 2014
Linux Security Week: October 20th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: Low: mailman security and bug fix update Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
RedHat Linux Updated mailman packages that fix a security issue and various bugs are now available for Red Hat Enterprise Linux 4. A flaw was found in Mailman. A remote attacker could spoof messages in the error log, and possibly trick the administrator into visiting malicious URLs via a carriage return/line feed sequence in the URI. This update has been rated as having low security impact by the Red Hat Security Response Team.
- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Low: mailman security and bug fix update
Advisory ID:       RHSA-2007:0779-02
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0779.html
Issue date:        2007-11-15
Updated on:        2007-11-15
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-4624 
- ---------------------------------------------------------------------

1. Summary:

Updated mailman packages that fix a security issue and various bugs are now
available for Red Hat Enterprise Linux 4.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Mailman is a program used to help manage email discussion lists.

A flaw was found in Mailman. A remote attacker could spoof messages in
the error log, and possibly trick the administrator into visiting malicious
URLs via a carriage return/line feed sequence in the URI. (CVE-2006-4624)

As well, these updated packages fix the following bugs:

* canceling a subscription on the confirm subscription request page
caused mailman to crash.

* editing the sender filter caused all spam filter rules to be deleted.

* the migrate-fhs script was not included.

* the mailman init script returned a zero (success) exit code even when
an incorrect command was given. For example, the "mailman foo" command
returned a zero exit code. In these updated packages the mailmain init
script returns the correct exit codes.

Users of Mailman are advised to upgrade to these updated packages, which
resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188


5. Bug IDs fixed (http://bugzilla.redhat.com/):

200036 - Canceling subscription confirmation crashes mailman
205651 - CVE-2006-4624 mailman logfile CRLF injection
223191 - Spam filters gets deleted when sender filter is edited
230939 - mailman-2.1.5.1-34.rhel4.5 is missing migrate-fhs script
242677 - Wrong init script

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/mailman-2.1.5.1-34.rhel4.6.src.rpm
cc98584c023f60a7b82b75ad32746ded  mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a  mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea  mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

ia64:
413aba0280251a5ad3da4bd35c235f8b  mailman-2.1.5.1-34.rhel4.6.ia64.rpm
92664a65306e390b3d2f2cfa4946b0a6  mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm

ppc:
c9cfb9aa11a5c281b3a82313d2ea233a  mailman-2.1.5.1-34.rhel4.6.ppc.rpm
aa933b2d2a4b5062bcfac412d199ce46  mailman-debuginfo-2.1.5.1-34.rhel4.6.ppc.rpm

s390:
0130bfcf79c1bb852ee1a57664e0318d  mailman-2.1.5.1-34.rhel4.6.s390.rpm
ddd5c59638d686af3afb285a4dd1bc7e  mailman-debuginfo-2.1.5.1-34.rhel4.6.s390.rpm

s390x:
05f6bc35d89b64f54ea98e94962c79fc  mailman-2.1.5.1-34.rhel4.6.s390x.rpm
fd90039a9b1bc188234a04efb1703945  mailman-debuginfo-2.1.5.1-34.rhel4.6.s390x.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e  mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e  mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/mailman-2.1.5.1-34.rhel4.6.src.rpm
cc98584c023f60a7b82b75ad32746ded  mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a  mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea  mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e  mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e  mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/mailman-2.1.5.1-34.rhel4.6.src.rpm
cc98584c023f60a7b82b75ad32746ded  mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a  mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea  mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

ia64:
413aba0280251a5ad3da4bd35c235f8b  mailman-2.1.5.1-34.rhel4.6.ia64.rpm
92664a65306e390b3d2f2cfa4946b0a6  mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e  mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e  mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/mailman-2.1.5.1-34.rhel4.6.src.rpm
cc98584c023f60a7b82b75ad32746ded  mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a  mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea  mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

ia64:
413aba0280251a5ad3da4bd35c235f8b  mailman-2.1.5.1-34.rhel4.6.ia64.rpm
92664a65306e390b3d2f2cfa4946b0a6  mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e  mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e  mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4624
http://www.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Disaster as CryptoWall encrypts US firm's entire server installation
Now Everyone Wants to Sell You a Magical Anonymity Router. Choose Wisely
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.