CVE-2006-4624

CRLF injection vulnerability in Utils.py in Mailman before 2.1.9rc1 allows remote attackers to spoof messages in the error log and possibly trick the administrator into visiting malicious URLs via CRLF sequences in the URI.
References
Link Resource
http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html
http://moritz-naumann.com/adv/0013/mailmanmulti/0013.txt
http://secunia.com/advisories/21732 Patch Vendor Advisory
http://secunia.com/advisories/22011 Vendor Advisory
http://secunia.com/advisories/22020 Vendor Advisory
http://secunia.com/advisories/22227 Vendor Advisory
http://secunia.com/advisories/22639 Vendor Advisory
http://secunia.com/advisories/27669 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200609-12.xml
http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295 Patch
http://svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923
http://www.debian.org/security/2006/dsa-1188
http://www.mandriva.com/security/advisories?name=MDKSA-2006:165
http://www.novell.com/linux/security/advisories/2006_25_sr.html
http://www.redhat.com/support/errata/RHSA-2007-0779.html
http://www.securityfocus.com/archive/1/445992/100/0/threaded
http://www.securityfocus.com/bid/19831
http://www.securityfocus.com/bid/20021
http://www.vupen.com/english/advisories/2006/3446
https://exchange.xforce.ibmcloud.com/vulnerabilities/28734
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9756
http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html
http://moritz-naumann.com/adv/0013/mailmanmulti/0013.txt
http://secunia.com/advisories/21732 Patch Vendor Advisory
http://secunia.com/advisories/22011 Vendor Advisory
http://secunia.com/advisories/22020 Vendor Advisory
http://secunia.com/advisories/22227 Vendor Advisory
http://secunia.com/advisories/22639 Vendor Advisory
http://secunia.com/advisories/27669 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200609-12.xml
http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295 Patch
http://svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923
http://www.debian.org/security/2006/dsa-1188
http://www.mandriva.com/security/advisories?name=MDKSA-2006:165
http://www.novell.com/linux/security/advisories/2006_25_sr.html
http://www.redhat.com/support/errata/RHSA-2007-0779.html
http://www.securityfocus.com/archive/1/445992/100/0/threaded
http://www.securityfocus.com/bid/19831
http://www.securityfocus.com/bid/20021
http://www.vupen.com/english/advisories/2006/3446
https://exchange.xforce.ibmcloud.com/vulnerabilities/28734
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9756
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2006-09-07 19:04

Updated : 2025-04-03 01:03


NVD link : CVE-2006-4624

Mitre link : CVE-2006-4624

CVE.ORG link : CVE-2006-4624


JSON object : View

Products Affected

gnu

  • mailman
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')