Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-019: mailman

Vulnerability Assessment Details

RHSA-2004-019: mailman

Vulnerability Assessment Summary
Check for the version of the mailman packages

Detailed Explanation for this Vulnerability Assessment

Updated mailman packages that close a DoS vulnerability present in mailman
versions prior to version 2.1 are now available.

Mailman is a mailing list manager.

Matthew Galgoci of Red Hat discovered a Denial of Service (DoS)
vulnerability in versions of Mailman prior to 2.1. A possible hacker could send
a carefully-crafted message causing mailman to crash. The Common
Vulnerabilities and Exposures project ( has assigned the name
CVE-2003-0991 to this issue.

Users of Mailman are advised to upgrade to the erratum packages, which
include a backported security fix and are not vulnerable to this issue.

Red Hat would like to thank Barry Warsaw for providing a patch for this

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Western Digital Scorpio Black 320GB Internal 7200RPM 2.5" (WD3200BEKT) HDD
Western Digital Scorpio Black 320GB Internal 7200RPM 2.5SEAGATE 80GB BARRACUDA 7200.7 SATA HARD DRIVE ST380819AS
SEAGATE  80GB BARRACUDA 7200.7 SATA HARD DRIVE ST380819AS  pictureBlue 2.5" SATA Hard Drive Protective Case Enclosure for 500GB Max Capacity X5V5
Blue 2.5HITACHI Deskstar HDP725050GLA360 SATA 3.0Gb/s 3.5" Internal Disk~Lot of 4 Disks
HITACHI Deskstar HDP725050GLA360 SATA 3.0Gb/s 3.5


No Discussions have been posted on this vulnerability.