Executive Summary
Summary | |
---|---|
Title | mailman security update |
Informations | |||
---|---|---|---|
Name | RHSA-2011:0308 | First vendor Publication | 2011-03-01 |
Vendor | RedHat | Last vendor Modification | 2011-03-01 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An updated mailman package that fixes multiple security issues is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Mailman is a program used to help manage email discussion lists. Multiple input sanitization flaws were found in the way Mailman displayed usernames of subscribed users on certain pages. If a user who is subscribed to a mailing list were able to trick a victim into visiting one of those pages, they could perform a cross-site scripting (XSS) attack against the victim. (CVE-2011-0707) Multiple input sanitization flaws were found in the way Mailman displayed mailing list information. A mailing list administrator could use this flaw to conduct a cross-site scripting (XSS) attack against victims viewing a list's "listinfo" page. (CVE-2010-3089) Red Hat would like to thank Mark Sapiro for reporting these issues. Users of mailman should upgrade to this updated package, which contains backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 631881 - CVE-2010-3089 mailman: Multiple security flaws leading to cross-site scripting (XSS) attacks 677375 - CVE-2011-0707 Mailman: Three XSS flaws due improper escaping of the full name of the member |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2011-0308.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12397 | |||
Oval ID: | oval:org.mitre.oval:def:12397 | ||
Title: | DSA-2170-1 mailman -- several | ||
Description: | Two cross site scripting vulnerabilities were been discovered in Mailman, a web-based mailing list manager. These allowed an attacker to retreive session cookies via inserting crafted JavaScript into confirmation messages and in the list admin interface . | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2170-1 CVE-2010-3089 CVE-2011-0707 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | mailman |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:13726 | |||
Oval ID: | oval:org.mitre.oval:def:13726 | ||
Title: | USN-1069-1 -- mailman vulnerabilities | ||
Description: | It was discovered that Mailman did not properly sanitize certain fields, resulting in cross-site scripting vulnerabilities. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1069-1 CVE-2010-3089 CVE-2011-0707 | Version: | 5 |
Platform(s): | Ubuntu 8.04 Ubuntu 10.10 Ubuntu 10.04 Ubuntu 9.10 Ubuntu 6.06 | Product(s): | mailman |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21661 | |||
Oval ID: | oval:org.mitre.oval:def:21661 | ||
Title: | RHSA-2011:0307: mailman security update (Moderate) | ||
Description: | Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:0307-01 CESA-2011:0307 CVE-2008-0564 CVE-2010-3089 CVE-2011-0707 | Version: | 42 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | mailman |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21908 | |||
Oval ID: | oval:org.mitre.oval:def:21908 | ||
Title: | RHSA-2011:0308: mailman security update (Moderate) | ||
Description: | Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:0308-01 CVE-2010-3089 CVE-2011-0707 | Version: | 29 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | mailman |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23190 | |||
Oval ID: | oval:org.mitre.oval:def:23190 | ||
Title: | ELSA-2011:0308: mailman security update (Moderate) | ||
Description: | Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0308-01 CVE-2010-3089 CVE-2011-0707 | Version: | 13 |
Platform(s): | Oracle Linux 6 | Product(s): | mailman |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23255 | |||
Oval ID: | oval:org.mitre.oval:def:23255 | ||
Title: | ELSA-2011:0307: mailman security update (Moderate) | ||
Description: | Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0307-01 CVE-2008-0564 CVE-2010-3089 CVE-2011-0707 | Version: | 17 |
Platform(s): | Oracle Linux 5 | Product(s): | mailman |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28189 | |||
Oval ID: | oval:org.mitre.oval:def:28189 | ||
Title: | DEPRECATED: ELSA-2011-0308 -- mailman security update (moderate) | ||
Description: | [3:2.1.12-14.2] - fix #677848 - fixed build problem without brew [3:2.1.12-14.1] - fix #677848 - fixed CVE-2010-3089 and CVE-2011-0707 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-0308 CVE-2010-3089 CVE-2011-0707 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | mailman |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-07-30 | Name : CentOS Update for mailman CESA-2011:0307 centos5 x86_64 File : nvt/gb_CESA-2011_0307_mailman_centos5_x86_64.nasl |
2012-07-09 | Name : RedHat Update for mailman RHSA-2011:0308-01 File : nvt/gb_RHSA-2011_0308-01_mailman.nasl |
2011-10-20 | Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2011-006) File : nvt/gb_macosx_su11-006.nasl |
2011-08-26 | Name : Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001) File : nvt/secpod_macosx_su11-001.nasl |
2011-08-09 | Name : CentOS Update for mailman CESA-2011:0307 centos5 i386 File : nvt/gb_CESA-2011_0307_mailman_centos5_i386.nasl |
2011-05-12 | Name : FreeBSD Ports: mailman File : nvt/freebsd_mailman9.nasl |
2011-03-24 | Name : Fedora Update for mailman FEDORA-2011-2102 File : nvt/gb_fedora_2011_2102_mailman_fc14.nasl |
2011-03-24 | Name : Fedora Update for mailman FEDORA-2011-2125 File : nvt/gb_fedora_2011_2125_mailman_fc13.nasl |
2011-03-09 | Name : Debian Security Advisory DSA 2170-1 (mailman) File : nvt/deb_2170_1.nasl |
2011-03-07 | Name : CentOS Update for mailman CESA-2011:0307 centos4 i386 File : nvt/gb_CESA-2011_0307_mailman_centos4_i386.nasl |
2011-03-07 | Name : RedHat Update for mailman RHSA-2011:0307-01 File : nvt/gb_RHSA-2011_0307-01_mailman.nasl |
2011-02-28 | Name : Ubuntu Update for mailman vulnerabilities USN-1069-1 File : nvt/gb_ubuntu_USN_1069_1.nasl |
2011-02-28 | Name : Mandriva Update for mailman MDVSA-2011:036 (mailman) File : nvt/gb_mandriva_MDVSA_2011_036.nasl |
2010-12-28 | Name : Fedora Update for mailman FEDORA-2010-14834 File : nvt/gb_fedora_2010_14834_mailman_fc14.nasl |
2010-12-28 | Name : Fedora Update for mailman FEDORA-2010-14877 File : nvt/gb_fedora_2010_14877_mailman_fc13.nasl |
2010-11-17 | Name : FreeBSD Ports: mailman File : nvt/freebsd_mailman8.nasl |
2010-10-04 | Name : Mandriva Update for mailman MDVSA-2010:191 (mailman) File : nvt/gb_mandriva_MDVSA_2010_191.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
70936 | Mailman Cgi/confirm.py Multiple Parameter XSS Mailman contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the 'full name' or 'username' fields in confirmation messages upon submission to the Cgi/confirm.py script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
68035 | Mailman listinfo.py List Description Field XSS Mailman contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the 'List Description' Field upon submission to the 'listinfo.py' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
68032 | Mailman HTMLFormatter.py List Description Field XSS Mailman contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the 'List Description' Field upon submission to the 'HTMLFormatter.py' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_mailman-110331.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2011-0308.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2011-0307.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20110301_mailman_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20110301_mailman_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_mailman-7484.nasl - Type : ACT_GATHER_INFO |
2011-10-13 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2011-006.nasl - Type : ACT_GATHER_INFO |
2011-05-19 | Name : A web application on the remote host has multiple cross-site scripting vulner... File : mailman_2_1_14.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_mailman-110426.nasl - Type : ACT_GATHER_INFO |
2011-05-04 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_mailman-7489.nasl - Type : ACT_GATHER_INFO |
2011-05-02 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_mailman-110426.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2011-001.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_10_6_7.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote Fedora host is missing a security update. File : fedora_2011-2125.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote Fedora host is missing a security update. File : fedora_2011-2102.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote Fedora host is missing a security update. File : fedora_2011-2030.nasl - Type : ACT_GATHER_INFO |
2011-03-11 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_64691c494b2211e0a22600e0815b8da8.nasl - Type : ACT_GATHER_INFO |
2011-03-03 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2011-0307.nasl - Type : ACT_GATHER_INFO |
2011-03-02 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2011-0307.nasl - Type : ACT_GATHER_INFO |
2011-03-02 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0308.nasl - Type : ACT_GATHER_INFO |
2011-02-24 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2011-036.nasl - Type : ACT_GATHER_INFO |
2011-02-23 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1069-1.nasl - Type : ACT_GATHER_INFO |
2011-02-21 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2170.nasl - Type : ACT_GATHER_INFO |
2010-12-20 | Name : The remote Fedora host is missing a security update. File : fedora_2010-14877.nasl - Type : ACT_GATHER_INFO |
2010-12-20 | Name : The remote Fedora host is missing a security update. File : fedora_2010-14834.nasl - Type : ACT_GATHER_INFO |
2010-11-04 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_4ab29e12e78711dfadfa00e0815b8da8.nasl - Type : ACT_GATHER_INFO |
2010-10-06 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2010-191.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:54:25 |
|