|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:007: mailman Vulnerability Assessment Details
|
SUSE-SA:2005:007: mailman |
||
Check for the version of the mailman package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory SUSE-SA:2005:007 (mailman). Mailman is a flexible mailing list management tool. It provides mail controlled subscription front ends and also includes CGI scripts to handle subscription, moderation and archive retrieval and other options. Due to incomplete input validation the 'private' CGI script which handles archive retrieval could be used to read any file on the system, including the configuration database of the mailman lists which include passwords in plain text. A remote attacker just needs a valid account on one mailing list managed by this mailman instance. This update fixes this problem and is tracked under the Mitre CVE ID CVE-2005-0202. Please see section (3), 'special instructions and notes'. Our previous mailman update (only announced in the SUSE Summary Report) additionally fixed the following two security problems: - a cross site scripting problem (CVE-2004-1177) - too weak auto generated passwords (CVE-2004-1143) This previous security fix requires the additional 'python-xml' RPM which was not required before. Solution : http://www.suse.de/security/advisories/2005_07_mailman.html Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
Supermicro 4U 36 Bay Storage Server 2.4Ghz 8-C 128GB 1x1280W Rails TrueNAS ZFS
$712.98
DELL PowerEdge R730XD 24x 2.5" Server Dual 750W Dual Heatsink - BareBones TESTED
$299.99
Dell Poweredge R640 Server | 2x Xeon Gold 6132 | 128GB | H730P | 8x HDD Trays
$1849.00
Dell Poweredge R640 Server | 2x Silver 4114 | 128GB | H730P | 4x 600GB 10KRPM HD
$1798.00
Dell PowerEdge R620 Server 2x E5-2660 v1 2.2GHz 16 Cores 256GB RAM 2x 300GB HDD
$89.99
Dell PowerEdge R730XD 28 Core Server 2X Xeon E5-2680 V4 H730 128GB RAM No HDD
$389.99
HP Proliant DL360 G9 2x3.4GHz Intel Hexa Core Xeon E5-2643v3, 24GB RAM, NO HDD
$129.99
DELL POWEREDGE R730 2X E5-2630 V4 512GB RAM NO HDD
$899.00
HP ProLiant DL380 Gen9 8SFF Server - E5-2698 v3 - 32Cores - 128GB Ram - 1TB HDD
$299.00
Dell PowerEdge R430 3.5 1U 2x E5-2666 v3 2.9ghz 20-Cores 128gb 4x Trays 2x 550w
$364.99
|
||
No Discussions have been posted on this vulnerability. |