Vulnerability Details : CVE-2006-4624
CRLF injection vulnerability in Utils.py in Mailman before 2.1.9rc1 allows remote attackers to spoof messages in the error log and possibly trick the administrator into visiting malicious URLs via CRLF sequences in the URI.
Products affected by CVE-2006-4624
- cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-4624
1.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-4624
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.6
|
LOW | AV:N/AC:H/Au:N/C:N/I:P/A:N |
4.9
|
2.9
|
NIST |
CWE ids for CVE-2006-4624
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2006-4624
-
Red Hat 2007-09-05Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205651 The Red Hat Security Response Team has rated this issue as having low security impact and expects to release a future update to address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 and 3 which are in maintenance mode. This bug will be addressed in a future update of Red Hat Enterprise Linux 4.
References for CVE-2006-4624
-
http://www.securityfocus.com/bid/20021
-
http://www.securityfocus.com/bid/19831
-
http://www.novell.com/linux/security/advisories/2006_25_sr.html
-
http://security.gentoo.org/glsa/glsa-200609-12.xml
-
http://www.redhat.com/support/errata/RHSA-2007-0779.html
-
http://moritz-naumann.com/adv/0013/mailmanmulti/0013.txt
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9756
-
http://www.securityfocus.com/archive/1/445992/100/0/threaded
-
http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295
Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/28734
-
http://www.vupen.com/english/advisories/2006/3446
-
http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html
[Mailman-Announce] RELEASED: Mailman 2.1.9
-
http://www.debian.org/security/2006/dsa-1188
-
http://svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:165
Jump to