-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2006:165 http://www.mandriva.com/security/ _______________________________________________________________________ Package : mailman Date : September 18, 2006 Affected: 2006.0, Corporate 3.0 _______________________________________________________________________ Problem Description: A flaw was discovered in how Mailman handles MIME multipart messages where an attacker could send a carefully-crafted MIME multipart message to a Mailman-run mailing list causing that mailing list to stop working (CVE-2006-2941). As well, a number of XSS (cross-site scripting) issues were discovered that could be exploited to perform XSS attacks against the Mailman administrator (CVE-2006-3636). Finally, a CRLF injection vulnerability allows remote attackers to spoof messages in the error log (CVE-2006-4624). Updated packages have been patched to address these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3636 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4624 _______________________________________________________________________ Updated Packages: Mandriva Linux 2006.0: 9979002d16562b3e62ceb6cfd21b45c6 2006.0/RPMS/mailman-2.1.6-6.4.20060mdk.i586.rpm 9b26c36c23c2a417df0d7772d97071ff 2006.0/SRPMS/mailman-2.1.6-6.4.20060mdk.src.rpm Mandriva Linux 2006.0/X86_64: 2ea71bec743e2fd8ff33724f99a3e5e8 x86_64/2006.0/RPMS/mailman-2.1.6-6.4.20060mdk.x86_64.rpm 9b26c36c23c2a417df0d7772d97071ff x86_64/2006.0/SRPMS/mailman-2.1.6-6.4.20060mdk.src.rpm Corporate 3.0: 2f43ed2ac1274394b252a1dca99cf825 corporate/3.0/RPMS/mailman-2.1.4-2.8.C30mdk.i586.rpm c7f43a47a27a1a1a074af957b9262c43 corporate/3.0/SRPMS/mailman-2.1.4-2.8.C30mdk.src.rpm Corporate 3.0/X86_64: 36c2945ad0699607b445f8df2df551d5 x86_64/corporate/3.0/RPMS/mailman-2.1.4-2.8.C30mdk.x86_64.rpm c7f43a47a27a1a1a074af957b9262c43 x86_64/corporate/3.0/SRPMS/mailman-2.1.4-2.8.C30mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFFDyhImqjQ0CJFipgRAqFsAJ9i+l+r6Yxi0FJcGnlSfrXnnCbsiACg02Pv kQ8KrC6mgCKwm+DEpFDDqAk= =OKMt -----END PGP SIGNATURE-----