![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.50384 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 2 FEDORA-2004-168 (mailman) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to mailman announced via advisory FEDORA-2004-168. Mailman is software to help manage email discussion lists, much like Majordomo and Smartmail. Unlike most similar products, Mailman gives each mailing list a webpage, and allows users to subscribe, unsubscribe, etc. over the Web. Even the list manager can administer his or her list entirely from the Web. Mailman also integrates most things people want to do with mailing lists, including archiving, mail <-> news gateways, and so on. Documentation can be found in: /usr/share/doc/mailman-2.1.5 When the package has finished installing, you will need to perform some additional installation steps, these are described in: /usr/share/doc/mailman-2.1.5/INSTALL.REDHAT Update Information: Fixes security issue CVE-2004-0412 noted in bug https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=123559 Mailman subscriber passwords could be retrieved by a remote attacker. Security hole is fixed in mailman-2.1.5 Important Installation Note: Some users have reported problems with bad queue counts after upgrading to version 2.1.5, the operating assumption is this was caused by performing an install while mailman was running. Prior to installing this rpm stop the mailman service via: % /sbin/service mailman stop Then after installation completes restart the service via: % /sbin/service mailman start This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/ 821a649aa77fb19c6cad8cba47f3d7d6 SRPMS/mailman-2.1.5-7.src.rpm 3a87ad29697b0e23799ba90fbbf0a290 x86_64/mailman-2.1.5-7.x86_64.rpm 88fb81f97a5677c25b788e7d33e7136f x86_64/debug/mailman-debuginfo-2.1.5-7.x86_64.rpm 32bf032891a272d8be1cba0d80ae01f8 i386/mailman-2.1.5-7.i386.rpm cf23a0c98911ce6c2b257b94836c7a01 i386/debug/mailman-debuginfo-2.1.5-7.i386.rpm This update can also be installed with the Update Agent you can launch the Update Agent with the 'up2date' command. Solution: Apply the appropriate updates. http://www.fedoranews.org/updates/FEDORA-2004-168.shtml Risk factor : Medium CVSS Score: 5.0 |
Cross-Ref: |
BugTraq ID: 10412 Common Vulnerability Exposure (CVE) ID: CVE-2004-0412 http://www.securityfocus.com/bid/10412 Conectiva Linux advisory: CLA-2004:842 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000842 http://marc.info/?l=bugtraq&m=109034869927955&w=2 http://security.gentoo.org/glsa/glsa-200406-04.xml http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:051 http://mail.python.org/pipermail/mailman-announce/2004-May/000072.html http://secunia.com/advisories/11701 XForce ISS Database: mailman-obtain-password(16256) https://exchange.xforce.ibmcloud.com/vulnerabilities/16256 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |