exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

debian.mailman.txt

debian.mailman.txt
Posted Aug 6, 2000
Site security.debian.org

Debian Security Advisory - Mailman v2.0 came with a security problem which was introduced during the 2.0 beta cycle, that could be exploited by clever local users to gain group mailman permission.

tags | local
systems | linux, debian
SHA-256 | 30dee8f152b4a9edc9ecffccae34190e23d99ca769cff09e817c35de1deb7e32

debian.mailman.txt

Change Mirror Download
       [-- BEGIN PGP SIGNED MESSAGE --]

----------------------------------------------------------------------------
Debian Security Advisory security@debian.org
http://www.debian.org/security/ Martin Schulze
August 5, 2000
----------------------------------------------------------------------------

Package: mailman
Vulnerability: local mailman group exploit
Debian-specific: no

Former versions of mailman v2.0 came with a security problem,
introduced during the 2.0 beta cycle, that could be exploited by
clever local users to gain group mailman permission. No exploit does
exist at the moment, though.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.


Debian GNU/Linux 2.1 alias slink
--------------------------------

Slink comes with version 1.0 that is not vulnerable.

Debian 2.2 alias potato
-----------------------

Potato comes with version 1.1 that is not vulnerable.

Debian Unstable alias woody
---------------------------

This version of Debian is not yet released and reflects the current
development release. Fixes are currently available for Intel ia32
and Motorola 680x0. Fixes for other architectures will be available
soon. In doubt, please recompile the package from source on your
own.

Source archives:

ftp://ftp.debian.org/debian/dists/woody/main/source/mail/mailman_2.0beta5-1.diff.gz
MD5 checksum: 177e666144c35d6b945b30dddf567fef
ftp://ftp.debian.org/debian/dists/woody/main/source/mail/mailman_2.0beta5-1.dsc
MD5 checksum: 431d66e4ef496ce48463ed55193d375c
ftp://ftp.debian.org/debian/dists/woody/main/source/mail/mailman_2.0beta5.orig.tar.gz
MD5 checksum: 2c2602b7745a56adecd4f24fdd6d446f

Intel ia32 architecture:

ftp://ftp.debian.org/debian/dists/woody/main/binary-i386/mail/mailman_2.0beta5-1.deb
MD5 checksum: e2a071bf4a9a3be02978df47ed58acb6

Motorola 680x0 architecture:

ftp://ftp.debian.org/debian/dists/woody/main/binary-m68k/mail/mailman_2.0beta5-1.deb
MD5 checksum: 8bb6367c1e249beaaaa8eb3b7fc71c27

----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable updates
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates
Mailing list: debian-security-announce@lists.debian.org

[-- END PGP SIGNED MESSAGE --]
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close