|Posted: Fri Feb 11, 2005 5:23 am Post subject: [Security] 20k Update 2005-02-10: mailman-2.1.5-8.fc2
Fedora Update Notification
Product : Fedora Core 2
Name : mailman
Version : 2.1.5
Release : 8.fc2
Summary : Mailing list manager with built in Web access.
Mailman is software to help manage email discussion lists, much like
Majordomo and Smartmail. Unlike most similar products, Mailman gives
each mailing list a webpage, and allows users to subscribe,
unsubscribe, etc. over the Web. Even the list manager can administer
his or her list entirely from the Web. Mailman also integrates most
things people want to do with mailing lists, including archiving, mail
< -> news gateways, and so on.
Documentation can be found in: /usr/share/doc/mailman-2.1.5
There is a critical security flaw in Mailman 2.1.5 which will allow
attackers to read arbitrary files.
The extent of the vulnerability depends on what version of Apache
(httpd) you are running, and (possibly) how you have configured your
web server. It is believed the vulnerability is not available when
Mailman is paired with a version of Apache >= 2.0, however earlier
versions of Apache, e.g. version 1.3, will allow the exploit when
executing a Mailman CGI script. All versions of Fedora have shipped
with the later 2.0 version of Apache and thus if you are running a
Fedora release you are not likely to be vulnerable to the exploit
unless you have explicitly downgraded the version of your web
server. However, installing this version of mailman with a security
patch represents a prudent safeguard.
This issue has been assigned CVE number CAN-2005-0202.
The bug report associated with this is:
The errata associated with this for RHEL releases is:
For additional piece of mind, it is recommended that you regenerate
your list member passwords. Instructions on how to do this, and more
information about this vulnerability are available here:
* Tue Feb 08 2005 John Dennis - 3:2.1.5-8.fc2
- fix security vulnerability CAN-2005-0202, errata RHSA-2005:136, bug #147343
This update can be downloaded from: