FreeBSD : mailman -- Multiple Vulnerabilities (fffa9257-3c17-11db-86ab-00123ffe8333)

high Nessus Plugin ID 22304

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Secunia reports :

Mailman can be exploited by malicious people to conduct cross-site scripting and phishing attacks, and cause a DoS (Denial of Service).

1) An error in the logging functionality can be exploited to inject a spoofed log message into the error log via a specially crafted URL.

Successful exploitation may trick an administrator into visiting a malicious website.

2) An error in the processing of malformed headers which does not follow the RFC 2231 standard can be exploited to cause a DoS (Denial of Service).

3) Some unspecified input isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?6dd8dd6d

http://www.nessus.org/u?dcdef3e4

Plugin Details

Severity: High

ID: 22304

File Name: freebsd_pkg_fffa92573c1711db86ab00123ffe8333.nasl

Version: 1.20

Type: local

Published: 9/5/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:mailman-with-htdig, p-cpe:/a:freebsd:freebsd:ja-mailman, p-cpe:/a:freebsd:freebsd:mailman, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/4/2006

Vulnerability Publication Date: 6/9/2006

Reference Information

CVE: CVE-2006-2191, CVE-2006-2941, CVE-2006-3636, CVE-2006-4624

BID: 19831

CWE: 94

Secunia: 21732