drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Einfügen von Text ins Fehlerlog in mailman
Name: |
Einfügen von Text ins Fehlerlog in mailman |
|
ID: |
RHSA-2007:0779-02 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux |
|
Datum: |
Do, 15. November 2007, 16:25 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4624 |
|
Applikationen: |
MailMan |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Low: mailman security and bug fix update Advisory ID: RHSA-2007:0779-02 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0779.html Issue date: 2007-11-15 Updated on: 2007-11-15 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-4624 - ---------------------------------------------------------------------
1. Summary:
Updated mailman packages that fix a security issue and various bugs are now available for Red Hat Enterprise Linux 4.
This update has been rated as having low security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Problem description:
Mailman is a program used to help manage email discussion lists.
A flaw was found in Mailman. A remote attacker could spoof messages in the error log, and possibly trick the administrator into visiting malicious URLs via a carriage return/line feed sequence in the URI. (CVE-2006-4624)
As well, these updated packages fix the following bugs:
* canceling a subscription on the confirm subscription request page caused mailman to crash.
* editing the sender filter caused all spam filter rules to be deleted.
* the migrate-fhs script was not included.
* the mailman init script returned a zero (success) exit code even when an incorrect command was given. For example, the "mailman foo" command returned a zero exit code. In these updated packages the mailmain init script returns the correct exit codes.
Users of Mailman are advised to upgrade to these updated packages, which resolve these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
200036 - Canceling subscription confirmation crashes mailman 205651 - CVE-2006-4624 mailman logfile CRLF injection 223191 - Spam filters gets deleted when sender filter is edited 230939 - mailman-2.1.5.1-34.rhel4.5 is missing migrate-fhs script 242677 - Wrong init script
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS: mailman-2.1.5.1-34.rhel4.6.src.rpm cc98584c023f60a7b82b75ad32746ded mailman-2.1.5.1-34.rhel4.6.src.rpm
i386: abd6759ac2f46e50d9de6c6fffc9117a mailman-2.1.5.1-34.rhel4.6.i386.rpm 8307354db23c68be6826122af40bdeea mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm
ia64: 413aba0280251a5ad3da4bd35c235f8b mailman-2.1.5.1-34.rhel4.6.ia64.rpm 92664a65306e390b3d2f2cfa4946b0a6 mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm
ppc: c9cfb9aa11a5c281b3a82313d2ea233a mailman-2.1.5.1-34.rhel4.6.ppc.rpm aa933b2d2a4b5062bcfac412d199ce46 mailman-debuginfo-2.1.5.1-34.rhel4.6.ppc.rpm
s390: 0130bfcf79c1bb852ee1a57664e0318d mailman-2.1.5.1-34.rhel4.6.s390.rpm ddd5c59638d686af3afb285a4dd1bc7e mailman-debuginfo-2.1.5.1-34.rhel4.6.s390.rpm
s390x: 05f6bc35d89b64f54ea98e94962c79fc mailman-2.1.5.1-34.rhel4.6.s390x.rpm fd90039a9b1bc188234a04efb1703945 mailman-debuginfo-2.1.5.1-34.rhel4.6.s390x.rpm
x86_64: 5f00ffd062da99497e20e27ae0b3fd2e mailman-2.1.5.1-34.rhel4.6.x86_64.rpm a79b911550a27718cf95a926113f968e mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: mailman-2.1.5.1-34.rhel4.6.src.rpm cc98584c023f60a7b82b75ad32746ded mailman-2.1.5.1-34.rhel4.6.src.rpm
i386: abd6759ac2f46e50d9de6c6fffc9117a mailman-2.1.5.1-34.rhel4.6.i386.rpm 8307354db23c68be6826122af40bdeea mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm
x86_64: 5f00ffd062da99497e20e27ae0b3fd2e mailman-2.1.5.1-34.rhel4.6.x86_64.rpm a79b911550a27718cf95a926113f968e mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: mailman-2.1.5.1-34.rhel4.6.src.rpm cc98584c023f60a7b82b75ad32746ded mailman-2.1.5.1-34.rhel4.6.src.rpm
i386: abd6759ac2f46e50d9de6c6fffc9117a mailman-2.1.5.1-34.rhel4.6.i386.rpm 8307354db23c68be6826122af40bdeea mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm
ia64: 413aba0280251a5ad3da4bd35c235f8b mailman-2.1.5.1-34.rhel4.6.ia64.rpm 92664a65306e390b3d2f2cfa4946b0a6 mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm
x86_64: 5f00ffd062da99497e20e27ae0b3fd2e mailman-2.1.5.1-34.rhel4.6.x86_64.rpm a79b911550a27718cf95a926113f968e mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: mailman-2.1.5.1-34.rhel4.6.src.rpm cc98584c023f60a7b82b75ad32746ded mailman-2.1.5.1-34.rhel4.6.src.rpm
i386: abd6759ac2f46e50d9de6c6fffc9117a mailman-2.1.5.1-34.rhel4.6.i386.rpm 8307354db23c68be6826122af40bdeea mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm
ia64: 413aba0280251a5ad3da4bd35c235f8b mailman-2.1.5.1-34.rhel4.6.ia64.rpm 92664a65306e390b3d2f2cfa4946b0a6 mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm
x86_64: 5f00ffd062da99497e20e27ae0b3fd2e mailman-2.1.5.1-34.rhel4.6.x86_64.rpm a79b911550a27718cf95a926113f968e mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4624 http://www.redhat.com/security/updates/classification/#low
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFHPGCOXlSAg2UNWIIRAkUmAJ9taRfEL3B9U8ICLLJ+itYHe2oiZgCfS1IP A4bwjHX2pMmxmTEDGsi1Qxw= =Nu9N -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|
|
|
|