Home > Security > Advisories

Advisories

Mandriva Advisories

Package name mailman
Date March 29th, 2006
Advisory ID MDKSA-2006:061
Affected versions CS3.0, 10.2
Synopsis Updated mailman packages fix DoS from badly formed mime multipart messages.

Problem Description

Scrubber.py, in Mailman 2.1.5 and earlier, when using email 2.5 (part
of Python), is susceptible to a DoS (mailman service stops delivering
for the list in question) if it encounters a badly formed mime
multipart message with only one part and that part has two blank lines
between the first boundary and the end boundary.

Updated packages have been patched to correct this issue.

Updated Packages

Corporate Server 3.0

 9c04212df3b3af0a656eae5e290e6270  corporate/3.0/RPMS/mailman-2.1.4-2.6.C30mdk.i586.rpm
 68e3e8d7fd980e8d6202d3d5ad5dbcfc  corporate/3.0/SRPMS/mailman-2.1.4-2.6.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 5633cfcdea5b43c352c5a6b807c4f676  x86_64/corporate/3.0/RPMS/mailman-2.1.4-2.6.C30mdk.x86_64.rpm
 68e3e8d7fd980e8d6202d3d5ad5dbcfc  x86_64/corporate/3.0/SRPMS/mailman-2.1.4-2.6.C30mdk.src.rpm

Mandriva Linux LE2005

 04dcdf49d50ca568b14504c46b22e50b  10.2/RPMS/mailman-2.1.5-15.3.102mdk.i586.rpm
 70e27cbd933a762b4c865f07647c44ea  10.2/SRPMS/mailman-2.1.5-15.3.102mdk.src.rpm

Mandriva Linux LE2005/X86_64

 52c377eb6eaaf8866a6099f06348de3f  x86_64/10.2/RPMS/mailman-2.1.5-15.3.102mdk.x86_64.rpm
 70e27cbd933a762b4c865f07647c44ea  x86_64/10.2/SRPMS/mailman-2.1.5-15.3.102mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0052

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.