Executive Summary

Titlesympa security update
NameDSA-2477First vendor Publication2012-05-20
VendorDebianLast vendor Modification2012-05-20
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores


Several vulnerabilities have been discovered in Sympa, a mailing list manager, that allow to skip the scenario-based authorization mechanisms. This vulnerability allows to display the archives management page, and download and delete the list archives by unauthorized users.

For the stable distribution (squeeze), this problem has been fixed in version 6.0.1+dfsg-4+squeeze1.

For the testing distribution (wheezy), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in version 6.1.11~dfsg-2.

We recommend that you upgrade your sympa packages.

Original Source

Url : http://www.debian.org/security/2012/dsa-2477

CWE : Common Weakness Enumeration

CWE-264Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration


OpenVAS Exploits

2012-05-31Name : FreeBSD Ports: sympa
File : nvt/freebsd_sympa0.nasl
2012-05-31Name : Debian Security Advisory DSA 2477-1 (sympa)
File : nvt/deb_2477_1.nasl

Nessus® Vulnerability Scanner

2012-05-22Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2477.nasl - Type : ACT_GATHER_INFO
2012-05-22Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_78c39232a34511e19d81d0df9acfd7e5.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
2014-02-17 11:31:05
  • Multiple Updates