copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2007.0927 -- [RedHat] -- Low: mailman security and bug fix update

Date: 16 November 2007
References: AA-2006.0073  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                         ESB-2007.0927 -- [RedHat]
                 Low: mailman security and bug fix update
                             16 November 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              mailman
Publisher:            Red Hat
Operating System:     Red Hat Linux 4
Impact:               Provide Misleading Information
Access:               Remote/Unauthenticated
CVE Names:            CVE-2006-4624

Ref:                  AA-2006.0073

Original Bulletin:    https://rhn.redhat.com/errata/RHSA-2007-0779.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Low: mailman security and bug fix update
Advisory ID:       RHSA-2007:0779-02
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0779.html
Issue date:        2007-11-15
Updated on:        2007-11-15
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-4624 
- - ---------------------------------------------------------------------

1. Summary:

Updated mailman packages that fix a security issue and various bugs are now
available for Red Hat Enterprise Linux 4.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Mailman is a program used to help manage email discussion lists.

A flaw was found in Mailman. A remote attacker could spoof messages in
the error log, and possibly trick the administrator into visiting malicious
URLs via a carriage return/line feed sequence in the URI. (CVE-2006-4624)

As well, these updated packages fix the following bugs:

* canceling a subscription on the confirm subscription request page
caused mailman to crash.

* editing the sender filter caused all spam filter rules to be deleted.

* the migrate-fhs script was not included.

* the mailman init script returned a zero (success) exit code even when
an incorrect command was given. For example, the "mailman foo" command
returned a zero exit code. In these updated packages the mailmain init
script returns the correct exit codes.

Users of Mailman are advised to upgrade to these updated packages, which
resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188


5. Bug IDs fixed (http://bugzilla.redhat.com/):

200036 - Canceling subscription confirmation crashes mailman
205651 - CVE-2006-4624 mailman logfile CRLF injection
223191 - Spam filters gets deleted when sender filter is edited
230939 - mailman-2.1.5.1-34.rhel4.5 is missing migrate-fhs script
242677 - Wrong init script

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/mailman-2.1.5.1-34.rhel4.6.src.rpm
cc98584c023f60a7b82b75ad32746ded  mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a  mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea  mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

ia64:
413aba0280251a5ad3da4bd35c235f8b  mailman-2.1.5.1-34.rhel4.6.ia64.rpm
92664a65306e390b3d2f2cfa4946b0a6  mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm

ppc:
c9cfb9aa11a5c281b3a82313d2ea233a  mailman-2.1.5.1-34.rhel4.6.ppc.rpm
aa933b2d2a4b5062bcfac412d199ce46  mailman-debuginfo-2.1.5.1-34.rhel4.6.ppc.rpm

s390:
0130bfcf79c1bb852ee1a57664e0318d  mailman-2.1.5.1-34.rhel4.6.s390.rpm
ddd5c59638d686af3afb285a4dd1bc7e  mailman-debuginfo-2.1.5.1-34.rhel4.6.s390.rpm

s390x:
05f6bc35d89b64f54ea98e94962c79fc  mailman-2.1.5.1-34.rhel4.6.s390x.rpm
fd90039a9b1bc188234a04efb1703945  mailman-debuginfo-2.1.5.1-34.rhel4.6.s390x.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e  mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e  mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/mailman-2.1.5.1-34.rhel4.6.src.rpm
cc98584c023f60a7b82b75ad32746ded  mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a  mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea  mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e  mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e  mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/mailman-2.1.5.1-34.rhel4.6.src.rpm
cc98584c023f60a7b82b75ad32746ded  mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a  mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea  mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

ia64:
413aba0280251a5ad3da4bd35c235f8b  mailman-2.1.5.1-34.rhel4.6.ia64.rpm
92664a65306e390b3d2f2cfa4946b0a6  mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e  mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e  mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/mailman-2.1.5.1-34.rhel4.6.src.rpm
cc98584c023f60a7b82b75ad32746ded  mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a  mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea  mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

ia64:
413aba0280251a5ad3da4bd35c235f8b  mailman-2.1.5.1-34.rhel4.6.ia64.rpm
92664a65306e390b3d2f2cfa4946b0a6  mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e  mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e  mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4624
http://www.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHPGCOXlSAg2UNWIIRAkUmAJ9taRfEL3B9U8ICLLJ+itYHe2oiZgCfS1IP
A4bwjHX2pMmxmTEDGsi1Qxw=
=Nu9N
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRz0CFSh9+71yA2DNAQKp+wP/SHxJPKW5/XQEoOoqO5p2eicl0r/wCG3H
+wmBbC/yZBD2hWNtHZxArayCA0Jqa8p/QYNU++LIq1lqWPak3j5MAcmStJAD0Tt2
6WhVACvmP2t7tmM1TLIX2Spcj7IcBG3W23flqgfUpNgtt6pqBdyAhOWsZNtYrw8X
Q5jBRUuIVgM=
=qSqb
-----END PGP SIGNATURE-----