Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the mailman package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory FEDORA-2004-167 (mailman).
Mailman is software to help manage email discussion lists, much like
Majordomo and Smartmail. Unlike most similar products, Mailman gives
each mailing list a webpage, and permits users to subscribe,
unsubscribe, etc. over the Web. Even the list manager can administer
his or her list entirely from the Web. Mailman also integrates most
things people want to do with mailing lists, including archiving, mail
<-> news gateways, and so on.
Documentation can be found in: /usr/share/doc/mailman-2.1.5
When the package has finished installing, you will need to perform some
additional installation steps, these are described in:
Fixes security issue CVE-2004-0412 noted in bug
Mailman subscriber passwords could be retrieved by a remote attacker.
Security hole is fixed in mailman-2.1.5
Important Installation Note:
Some users have reported problems with bad queue counts after
upgrading to version 2.1.5, the operating assumption is this was
caused by performing an install while mailman was running. Prior to
installing this rpm stop the mailman service via:
% /sbin/service mailman stop
Then after installation completes restart the service via:
% /sbin/service mailman start
Red Hat RPM versions of mailman 2.1.5-6 and above have enhanced the
init.d script that controls the mailman service so that '/sbin/service
mailman status' now returns valid information. The RPM has been
augmented to detect if mailman is running prior to installation and if
so it will temporarily stop mailman during the install and restart
mailman after the install completes. If mailman was not running the
RPM will not start mailman after installation. Since the RPM depends
on service status working the installed version of mailman you are
replacing must be at least 2.1.5-6 for the automatic pausing of
mailman during installation to work. This also means since this is the
first RPM with this feature you will need to manually pause mailman
during installation, future upgrades should be automatic.
Solution : http://www.fedoranews.org/updates/FEDORA-2004-167.shtml
Network Security Threat Level: High
Networks Security ID: 10412
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|Mid-Level Enterprise HP DL360 G7 Server 2x 2.66Ghz X5650 6C 32GB
|Dell R620 10 Bay 2 x E5-2630 (12 Cores Total) 8 x 500GB HDD H310 48GB RAM 2PS
|Windows Server Standard 2012 R2 x64 ( 2CPU/2VM )
|Lot of 11 Intel Xeon E5540 2.53MHz 8M LGA1366 SLBF6 Quad Core Server CPUs^
No Discussions have been posted on this vulnerability.