Mandriva 1271 Published by

The Mandriva Security Team published a new security update for Mandriva Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:165
http://www.mandriva.com/security/
_______________________________________________________________________

Package : mailman
Date : September 18, 2006
Affected: 2006.0, Corporate 3.0
_______________________________________________________________________

Problem Description:

A flaw was discovered in how Mailman handles MIME multipart messages
where an attacker could send a carefully-crafted MIME multipart
message to a Mailman-run mailing list causing that mailing list to
stop working (CVE-2006-2941).

As well, a number of XSS (cross-site scripting) issues were discovered
that could be exploited to perform XSS attacks against the Mailman
administrator (CVE-2006-3636).

Finally, a CRLF injection vulnerability allows remote attackers to
spoof messages in the error log (CVE-2006-4624).

Updated packages have been patched to address these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3636
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4624
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2006.0:
9979002d16562b3e62ceb6cfd21b45c6 2006.0/RPMS/mailman-2.1.6-6.4.20060mdk.i586.rpm
9b26c36c23c2a417df0d7772d97071ff 2006.0/SRPMS/mailman-2.1.6-6.4.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
2ea71bec743e2fd8ff33724f99a3e5e8 x86_64/2006.0/RPMS/mailman-2.1.6-6.4.20060mdk.x86_64.rpm
9b26c36c23c2a417df0d7772d97071ff x86_64/2006.0/SRPMS/mailman-2.1.6-6.4.20060mdk.src.rpm

Corporate 3.0:
2f43ed2ac1274394b252a1dca99cf825 corporate/3.0/RPMS/mailman-2.1.4-2.8.C30mdk.i586.rpm
c7f43a47a27a1a1a074af957b9262c43 corporate/3.0/SRPMS/mailman-2.1.4-2.8.C30mdk.src.rpm

Corporate 3.0/X86_64:
36c2945ad0699607b445f8df2df551d5 x86_64/corporate/3.0/RPMS/mailman-2.1.4-2.8.C30mdk.x86_64.rpm
c7f43a47a27a1a1a074af957b9262c43 x86_64/corporate/3.0/SRPMS/mailman-2.1.4-2.8.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFDyhImqjQ0CJFipgRAqFsAJ9i+l+r6Yxi0FJcGnlSfrXnnCbsiACg02Pv
kQ8KrC6mgCKwm+DEpFDDqAk=
=OKMt
-----END PGP SIGNATURE-----