Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 2 2004-168: mailman

Vulnerability Assessment Details

Fedora Core 2 2004-168: mailman

Vulnerability Assessment Summary
Check for the version of the mailman package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2004-168 (mailman).

Mailman is software to help manage email discussion lists, much like
Majordomo and Smartmail. Unlike most similar products, Mailman gives
each mailing list a webpage, and permits users to subscribe,
unsubscribe, etc. over the Web. Even the list manager can administer
his or her list entirely from the Web. Mailman also integrates most
things people want to do with mailing lists, including archiving, mail
<-> news gateways, and so on.

Documentation can be found in: /usr/share/doc/mailman-2.1.5

When the package has finished installing, you will need to perform some
additional installation steps, these are described in:

Update Information:

Fixes security issue CVE-2004-0412 noted in bug

Mailman subscriber passwords could be retrieved by a remote attacker.
Security hole is fixed in mailman-2.1.5

Important Installation Note:

Some users have reported problems with bad queue counts after
upgrading to version 2.1.5, the operating assumption is this was
caused by performing an install while mailman was running. Prior to
installing this rpm stop the mailman service via:

% /sbin/service mailman stop

Then after installation completes restart the service via:

% /sbin/service mailman start

Red Hat RPM versions of mailman 2.1.5-6 and above have enhanced the
init.d script that controls the mailman service so that '/sbin/service
mailman status' now returns valid information. The RPM has been
augmented to detect if mailman is running prior to installation and if
so it will temporarily stop mailman during the install and restart
mailman after the install completes. If mailman was not running the
RPM will not start mailman after installation. Since the RPM depends
on service status working the installed version of mailman you are
replacing must be at least 2.1.5-6 for the automatic pausing of
mailman during installation to work. This also means since this is the
first RPM with this feature you will need to manually pause mailman
during installation, future upgrades should be automatic.

Solution :
Network Security Threat Level: High

Networks Security ID: 10412

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Lenovo 21.5" Ideacentre AIO 520-22ICB F0DT001TUS Core i3 4GB RAM 1TB HD
Lenovo 21.5Powerful Gaming PC GTX 1050 Quad Core I5 WIFI Windows 10 8GB Ram 1 TB HDD HDMI
Powerful Gaming PC GTX 1050 Quad Core I5 WIFI Windows 10 8GB Ram 1 TB HDD HDMI pictureDell Inspiron 7560 Laptop/15.6"FHD/7th Gen Core i7/8GB RAM/1 TB HDD/256 GB SSD
Dell Inspiron 7560 Laptop/15.62017 Apple iMac 21.5" 2.3 - 3.6 GHz 7th Gen i5 / 8 GB / 1TB HD EXCELLENT IN BOX
2017 Apple iMac 21.5


No Discussions have been posted on this vulnerability.