Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 1 2004-167: mailman

Vulnerability Assessment Details

Fedora Core 1 2004-167: mailman

Vulnerability Assessment Summary
Check for the version of the mailman package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2004-167 (mailman).

Mailman is software to help manage email discussion lists, much like
Majordomo and Smartmail. Unlike most similar products, Mailman gives
each mailing list a webpage, and permits users to subscribe,
unsubscribe, etc. over the Web. Even the list manager can administer
his or her list entirely from the Web. Mailman also integrates most
things people want to do with mailing lists, including archiving, mail
<-> news gateways, and so on.

Documentation can be found in: /usr/share/doc/mailman-2.1.5

When the package has finished installing, you will need to perform some
additional installation steps, these are described in:

Update Information:

Fixes security issue CVE-2004-0412 noted in bug

Mailman subscriber passwords could be retrieved by a remote attacker.
Security hole is fixed in mailman-2.1.5

Important Installation Note:

Some users have reported problems with bad queue counts after
upgrading to version 2.1.5, the operating assumption is this was
caused by performing an install while mailman was running. Prior to
installing this rpm stop the mailman service via:

% /sbin/service mailman stop

Then after installation completes restart the service via:

% /sbin/service mailman start

Red Hat RPM versions of mailman 2.1.5-6 and above have enhanced the
init.d script that controls the mailman service so that '/sbin/service
mailman status' now returns valid information. The RPM has been
augmented to detect if mailman is running prior to installation and if
so it will temporarily stop mailman during the install and restart
mailman after the install completes. If mailman was not running the
RPM will not start mailman after installation. Since the RPM depends
on service status working the installed version of mailman you are
replacing must be at least 2.1.5-6 for the automatic pausing of
mailman during installation to work. This also means since this is the
first RPM with this feature you will need to manually pause mailman
during installation, future upgrades should be automatic.

Solution :
Network Security Threat Level: High

Networks Security ID: 10412

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

3710 ATA-133 IDE RAID Card
3710 ATA-133 IDE RAID Card pictureNexsan ATABeast ATA Beast Raid Controller Card Fiber Channel J7 FOR IDE DRIVES
Nexsan ATABeast ATA Beast Raid Controller Card Fiber Channel J7 FOR IDE  DRIVES pictureIntel RAID Adapters AXXRMS2AF040
Intel RAID Adapters AXXRMS2AF040 pictureDell PowerEdge T320 Six Core Xeon E5-2440 2.4GHZ 48GB RAID 12TB SAS Tower Server
Dell PowerEdge T320 Six Core Xeon E5-2440 2.4GHZ 48GB RAID 12TB SAS Tower Server picture


No Discussions have been posted on this vulnerability.