Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.882206
Categoría:CentOS Local Security Checks
Título:CentOS Update for mailman CESA-2015:1153 centos7
Resumen:Check the version of mailman
Descripción:Summary:
Check the version of mailman

Vulnerability Insight:
Mailman is a program used to help manage email
discussion lists.
It was found that mailman did not sanitize the list name before passing it
to certain MTAs. A local attacker could use this flaw to execute arbitrary
code as the user running mailman. (CVE-2015-2775)

This update also fixes the following bugs:

* Previously, it was impossible to configure Mailman in a way that
Domain-based Message Authentication, Reporting & Conformance (DMARC) would
recognize Sender alignment for Domain Key Identified Mail (DKIM)
signatures. Consequently, Mailman list subscribers that belonged to a mail
server with a 'reject' policy for DMARC, such as yahoo.com or AOL.com, were
unable to receive Mailman forwarded messages from senders residing in any
domain that provided DKIM signatures. With this update, domains with a
'reject' DMARC policy are recognized correctly, and Mailman list
administrators are able to configure the way these messages are handled. As
a result, after a proper configuration, subscribers now correctly receive
Mailman forwarded messages in this scenario. (BZ#1229288)

* Previously, the /etc/mailman file had incorrectly set permissions, which
in some cases caused removing Mailman lists to fail with a ''NoneType'
object has no attribute 'close'' message. With this update, the permissions
value for /etc/mailman is correctly set to 2775 instead of 0755, and
removing Mailman lists now works as expected. (BZ#1229307)

* Prior to this update, the mailman utility incorrectly installed the
tmpfiles configuration in the /etc/tmpfiles.d/ directory. As a consequence,
changes made to mailman tmpfiles configuration were overwritten if the
mailman packages were reinstalled or updated. The mailman utility now
installs the tmpfiles configuration in the /usr/lib/tmpfiles.d/ directory,
and changes made to them by the user are preserved on reinstall or update.
(BZ#1229306)

All mailman users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.

Affected Software/OS:
mailman on CentOS 7

Solution:
Please install the updated packages.

CVSS Score:
7.6

CVSS Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-2775
BugTraq ID: 73922
http://www.securityfocus.com/bid/73922
Debian Security Information: DSA-3214 (Google Search)
http://www.debian.org/security/2015/dsa-3214
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156742.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154911.html
https://mail.python.org/pipermail/mailman-announce/2015-March/000209.html
https://mail.python.org/pipermail/mailman-developers/2015-March/024871.html
https://mail.python.org/pipermail/mailman-developers/2015-March/024875.html
RedHat Security Advisories: RHSA-2015:1153
http://rhn.redhat.com/errata/RHSA-2015-1153.html
RedHat Security Advisories: RHSA-2015:1417
http://rhn.redhat.com/errata/RHSA-2015-1417.html
http://www.securitytracker.com/id/1032033
http://www.ubuntu.com/usn/USN-2558-1
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.