exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

debian.mailman.txt

debian.mailman.txt
Posted Aug 6, 2000
Site security.debian.org

Debian Security Advisory - Mailman v2.0 came with a security problem which was introduced during the 2.0 beta cycle, that could be exploited by clever local users to gain group mailman permission.

tags | local
systems | linux, debian
SHA-256 | 30dee8f152b4a9edc9ecffccae34190e23d99ca769cff09e817c35de1deb7e32

debian.mailman.txt

Change Mirror Download
       [-- BEGIN PGP SIGNED MESSAGE --]

----------------------------------------------------------------------------
Debian Security Advisory security@debian.org
http://www.debian.org/security/ Martin Schulze
August 5, 2000
----------------------------------------------------------------------------

Package: mailman
Vulnerability: local mailman group exploit
Debian-specific: no

Former versions of mailman v2.0 came with a security problem,
introduced during the 2.0 beta cycle, that could be exploited by
clever local users to gain group mailman permission. No exploit does
exist at the moment, though.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.


Debian GNU/Linux 2.1 alias slink
--------------------------------

Slink comes with version 1.0 that is not vulnerable.

Debian 2.2 alias potato
-----------------------

Potato comes with version 1.1 that is not vulnerable.

Debian Unstable alias woody
---------------------------

This version of Debian is not yet released and reflects the current
development release. Fixes are currently available for Intel ia32
and Motorola 680x0. Fixes for other architectures will be available
soon. In doubt, please recompile the package from source on your
own.

Source archives:

ftp://ftp.debian.org/debian/dists/woody/main/source/mail/mailman_2.0beta5-1.diff.gz
MD5 checksum: 177e666144c35d6b945b30dddf567fef
ftp://ftp.debian.org/debian/dists/woody/main/source/mail/mailman_2.0beta5-1.dsc
MD5 checksum: 431d66e4ef496ce48463ed55193d375c
ftp://ftp.debian.org/debian/dists/woody/main/source/mail/mailman_2.0beta5.orig.tar.gz
MD5 checksum: 2c2602b7745a56adecd4f24fdd6d446f

Intel ia32 architecture:

ftp://ftp.debian.org/debian/dists/woody/main/binary-i386/mail/mailman_2.0beta5-1.deb
MD5 checksum: e2a071bf4a9a3be02978df47ed58acb6

Motorola 680x0 architecture:

ftp://ftp.debian.org/debian/dists/woody/main/binary-m68k/mail/mailman_2.0beta5-1.deb
MD5 checksum: 8bb6367c1e249beaaaa8eb3b7fc71c27

----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable updates
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates
Mailing list: debian-security-announce@lists.debian.org

[-- END PGP SIGNED MESSAGE --]
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close