New versions of mailman fixes cookie attack
Posted by LinuxSecurity.com Team   
Debian We have become aware that the version mailman as supplied in Debian GNU/Linux 2.1 has a problem with verifying list administrators. The problem is that the cookie value generation used was predictable, so using forged authentication cookies it was possible to access the list administration webpages without knowing the proper password.
-----BEGIN PGP SIGNED MESSAGE-----


We have become aware that the version mailman as supplied in Debian
GNU/Linux 2.1 has a problem with verifying list administrators. The
problem is that the cookie value generation used was predictable, so
using forged authentication cookies it was possible to access the
list administration webpages without knowing the proper password.
More information about this vulnerability can be found at
http://www.python.org/pipermail/mailman-developers/1999-
June/001128.html

This has been fixed in version 1.0rc2-5.

We recommend you upgrade your mailman package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.1 alias slink
- --------------------------------

  This version of Debian was released only for Intel, the Motorola
  680x0, the alpha and the Sun sparc architecture.
  
  Source archives:
    http://security.debian.org/dists/stable/updates/binary-
source/mailman_1.0rc2-5.diff.gz
      MD5 checksum: 096d96ebf89341b148d2ae917037559a
    http://security.debian.org/dists/stable/updates/binary-
source/mailman_1.0rc2-5.dsc
      MD5 checksum: a407c72b6d80163b04ddc5fb895b8fbd
    http://security.debian.org/dists/stable/updat
es/binary-source/mailman_1.0rc2.orig.tar.gz
      MD5 checksum: 6916959db9144ecaf004fcd9be32a020
  
  Alpha architecture:
    http://security.debian.org/dists/stable/updates/binary-
alpha/mailman_1.0rc2-5_alpha.deb
      MD5 checksum: 0f053b62d9dd51d4e2c0843258eee453
  
  Intel ia32 architecture:
    http://security.debian.org/dists/stable/updates/binary-
i386/mailman_1.0rc2-5_i386.deb
      MD5 checksum: d9b0f93458a41055ba1b39891e0a5ca5
  
  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/binary-
m68k/mailman_1.0rc2-5_m68k.deb
      MD5 checksum: 94fc7996e4b296a4c944fe08ccb44503
  
  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/binary-
sparc/mailman_1.0rc2-5_sparc.deb
      MD5 checksum: e27d100b24d0c87c02cc86b7aadded0d

  

  These files will be copied into
  ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

Please note you can also use apt to always get the latest security
updates. To do so add the following line to /etc/apt/sources.list:

  deb http://security.debian.org/ 
stable updates


- -- 
Debian GNU/Linux      .    Security Managers     .   security@debian.org
              debian-security-announce@lists.debian.org
  Christian Hudon     .     Wichert Akkerman     .     Martin Schulze
   .     .   


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBN3Av9KjZR/ntlUftAQFFjwL/VwNslEzha3yT4k3wwDSedm0XEiHIUCS1
+ngWFIrPnLzfJ/jK2atXAZc98wwFxjxOTDWnGuc4RBjRi4NqBduQsVwaIHelSbK2
u9uPiNvzUhPiCUdzDusjy8ysUmzJIHd8
=PgQB
-----END PGP SIGNATURE-----