Lucene search

K
freebsdFreeBSDA5F160FA-DEEE-11E4-99F8-080027EF73EC
HistoryMar 27, 2015 - 12:00 a.m.

mailman -- path traversal vulnerability

2015-03-2700:00:00
vuxml.freebsd.org
15

CVSS2

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

EPSS

0.031

Percentile

91.0%

Mark Sapiro reports:

A path traversal vulnerability has been discovered and fixed. This
vulnerability is only exploitable by a local user on a Mailman
server where the suggested Exim transport, the Postfix
postfix_to_mailman.py transport or some other programmatic MTA
delivery not using aliases is employed.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchmailman< 2.1.20UNKNOWN
FreeBSDanynoarchmailman-with-htdig< 2.1.20UNKNOWN
FreeBSDanynoarchja-mailman< 2.1.14.j7_2,1UNKNOWN

CVSS2

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

EPSS

0.031

Percentile

91.0%