what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2011-036

Mandriva Linux Security Advisory 2011-036
Posted Feb 23, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-036 - Multiple cross-site scripting vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the username field in a confirmation message.

tags | advisory, remote, web, arbitrary, cgi, vulnerability, xss
systems | linux, mandriva
advisories | CVE-2011-0707
SHA-256 | ea5c67f8416addc10d7426c9a007de08e8c3a2a7563158dfc18282c74b813aa4

Mandriva Linux Security Advisory 2011-036

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:036
http://www.mandriva.com/security/
_______________________________________________________________________

Package : mailman
Date : February 23, 2011
Affected: 2009.0, 2010.0, 2010.1, Corporate 4.0, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in mailman:

Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py
in GNU Mailman 2.1.14 and earlier allow remote attackers to inject
arbitrary web script or HTML via the (1) full name or (2) username
field in a confirmation message (CVE-2011-0707).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0707
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2009.0:
47a36cb8bb5464358047e119a573f0fb 2009.0/i586/mailman-2.1.11-1.3mdv2009.0.i586.rpm
79afe7d6091352e440e02107ab466efe 2009.0/SRPMS/mailman-2.1.11-1.3mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
3a07afa82cf9334e9d2cbd88208c578a 2009.0/x86_64/mailman-2.1.11-1.3mdv2009.0.x86_64.rpm
79afe7d6091352e440e02107ab466efe 2009.0/SRPMS/mailman-2.1.11-1.3mdv2009.0.src.rpm

Mandriva Linux 2010.0:
20c696c21b949cb810f055d3b3803a12 2010.0/i586/mailman-2.1.12-3.3mdv2010.0.i586.rpm
4e461a2eb191aa9665ae4c8723ac1b17 2010.0/SRPMS/mailman-2.1.12-3.3mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
9997c9ffed7a9672c92282c73f187aa1 2010.0/x86_64/mailman-2.1.12-3.3mdv2010.0.x86_64.rpm
4e461a2eb191aa9665ae4c8723ac1b17 2010.0/SRPMS/mailman-2.1.12-3.3mdv2010.0.src.rpm

Mandriva Linux 2010.1:
3c4ec4ef441084a5011d9c10b441df56 2010.1/i586/mailman-2.1.13-1.3mdv2010.2.i586.rpm
2376bf5d3a1669352dfd8f11840bea55 2010.1/SRPMS/mailman-2.1.13-1.3mdv2010.2.src.rpm

Mandriva Linux 2010.1/X86_64:
3d6740a45395643aea20eaa55c584668 2010.1/x86_64/mailman-2.1.13-1.3mdv2010.2.x86_64.rpm
2376bf5d3a1669352dfd8f11840bea55 2010.1/SRPMS/mailman-2.1.13-1.3mdv2010.2.src.rpm

Corporate 4.0:
1ba9ef634bf145c569009dbc7f717f65 corporate/4.0/i586/mailman-2.1.6-6.5.20060mlcs4.i586.rpm
d9e1706712003f86bcb18dcc0fbb9307 corporate/4.0/SRPMS/mailman-2.1.6-6.5.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
f151b2121b079b4821c2d88e276c1a19 corporate/4.0/x86_64/mailman-2.1.6-6.5.20060mlcs4.x86_64.rpm
d9e1706712003f86bcb18dcc0fbb9307 corporate/4.0/SRPMS/mailman-2.1.6-6.5.20060mlcs4.src.rpm

Mandriva Enterprise Server 5:
ecfdebbe4501d6d2ff60834f9050d9f7 mes5/i586/mailman-2.1.11-1.3mdvmes5.1.i586.rpm
c828514e473947b0b21d90db6d5c56eb mes5/SRPMS/mailman-2.1.11-1.3mdvmes5.1.src.rpm

Mandriva Enterprise Server 5/X86_64:
b6d9bfdaf7e2f33f942d1f3408eebb02 mes5/x86_64/mailman-2.1.11-1.3mdvmes5.1.x86_64.rpm
c828514e473947b0b21d90db6d5c56eb mes5/SRPMS/mailman-2.1.11-1.3mdvmes5.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFNZRSimqjQ0CJFipgRAgoHAKCFFWAwwIJOKZQ7LLy2Ys1vBKmJngCg3w7/
0VY4v73uqXZ5zl5CMiIKH0o=
=irx9
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close