Lucene search

K
ubuntuUbuntuUSN-3118-1
HistoryNov 01, 2016 - 12:00 a.m.

Mailman vulnerabilities

2016-11-0100:00:00
ubuntu.com
50

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9.1

Confidence

High

EPSS

0.002

Percentile

61.1%

Releases

  • Ubuntu 16.10
  • Ubuntu 16.04 ESM
  • Ubuntu 14.04 ESM
  • Ubuntu 12.04

Packages

  • mailman - Powerful, web-based mailing list manager

Details

It was discovered that the Mailman administrative web interface did not
protect against cross-site request forgery (CSRF) attacks. If an
authenticated user were tricked into visiting a malicious website while
logged into Mailman, a remote attacker could perform administrative
actions. This issue only affected Ubuntu 12.04 LTS. (CVE-2016-7123)

Nishant Agarwala discovered that the Mailman user options page did not
protect against cross-site request forgery (CSRF) attacks. If an
authenticated user were tricked into visiting a malicious website while
logged into Mailman, a remote attacker could modify user options.
(CVE-2016-6893)

OSVersionArchitecturePackageVersionFilename
Ubuntu16.10noarchmailman< 1:2.1.22-1ubuntu0.1UNKNOWN
Ubuntu16.10noarchmailman-dbgsym< 1:2.1.22-1ubuntu0.1UNKNOWN
Ubuntu16.04noarchmailman< 1:2.1.20-1ubuntu0.1UNKNOWN
Ubuntu16.04noarchmailman-dbgsym< 1:2.1.20-1ubuntu0.1UNKNOWN
Ubuntu14.04noarchmailman< 1:2.1.16-2ubuntu0.2UNKNOWN
Ubuntu14.04noarchmailman-dbgsym< 1:2.1.16-2ubuntu0.2UNKNOWN
Ubuntu12.04noarchmailman< 1:2.1.14-3ubuntu0.4UNKNOWN
Ubuntu12.04noarchmailman-dbgsym< 1:2.1.14-3ubuntu0.4UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9.1

Confidence

High

EPSS

0.002

Percentile

61.1%