drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Scripting in MailMan
Name: |
Cross-Site Scripting in MailMan |
|
ID: |
DSA-4108-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian jessie, Debian stretch |
|
Datum: |
Fr, 9. Februar 2018, 14:47 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5950 |
|
Applikationen: |
MailMan |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4108-1 security@debian.org https://www.debian.org/security/ Thijs Kinkhorst February 09, 2018 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : mailman CVE ID : CVE-2018-5950 Debian Bug : 888201
Calum Hutton and the Mailman team discovered a cross site scripting and information leak vulnerability in the user options page. A remote attacker could use a crafted URL to steal cookie information or to fish for whether a user is subscribed to a list with a private roster.
For the oldstable distribution (jessie), this problem has been fixed in version 2.1.18-2+deb8u2.
For the stable distribution (stretch), this problem has been fixed in version 2.1.23-1+deb9u2.
We recommend that you upgrade your mailman packages.
For the detailed security status of mailman please refer to its security tracker page at: https://security-tracker.debian.org/tracker/mailman
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQEuBAEBCAAYBQJafXf7ERx0aGlqc0BkZWJpYW4ub3JnAAoJEFb2GnlAHawEs+wH /0hNhaCYypt3GLdTJkFVGqTlPsTFUxWv8N2vLiWvpAnVunRfapUwIYn4csUd7Wlz 8jIr+UhLoe/8CfX63svA486T8CDRPmkFcj0QpdLMsppJAhzZds7AvZFG6xtyptx8 nIvbePeMxC4eOUVrrjgHKz4EYMX3YCuN/IuYxllCvEaoAM1pUTmE2nd1M43ylxbx UX3LEJmKVyvV4XLQE38Cvn+nuXsz0rRrgbA3alnugnloM+TffuQpjkAicZbmXRG3 8xEKlnTYZSVPAugyxh72VaPgkeXcpYIqfyuJzGMUi53vE82rAgaMK+kbK87nAa35 ANtjnSGwstSEdEGUGw+jiLM= =/WgV -----END PGP SIGNATURE-----
|
|
|
|