CVE-2006-2941

Mailman before 2.1.9rc1 allows remote attackers to cause a denial of service via unspecified vectors involving "standards-breaking RFC 2231 formatted headers".
References
Link Resource
http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html
http://rhn.redhat.com/errata/RHSA-2006-0600.html
http://secunia.com/advisories/21732 Patch Vendor Advisory
http://secunia.com/advisories/21792 Vendor Advisory
http://secunia.com/advisories/21837 Vendor Advisory
http://secunia.com/advisories/21879 Vendor Advisory
http://secunia.com/advisories/22011 Vendor Advisory
http://secunia.com/advisories/22020 Vendor Advisory
http://secunia.com/advisories/22639 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200609-12.xml
http://securitytracker.com/id?1016808
http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295 Patch
http://svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923 Patch
http://www.mandriva.com/security/advisories?name=MDKSA-2006:165
http://www.novell.com/linux/security/advisories/2006_25_sr.html
http://www.securityfocus.com/bid/19831
http://www.ubuntu.com/usn/usn-345-1
http://www.vupen.com/english/advisories/2006/3446
https://exchange.xforce.ibmcloud.com/vulnerabilities/28732
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9912
http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html
http://rhn.redhat.com/errata/RHSA-2006-0600.html
http://secunia.com/advisories/21732 Patch Vendor Advisory
http://secunia.com/advisories/21792 Vendor Advisory
http://secunia.com/advisories/21837 Vendor Advisory
http://secunia.com/advisories/21879 Vendor Advisory
http://secunia.com/advisories/22011 Vendor Advisory
http://secunia.com/advisories/22020 Vendor Advisory
http://secunia.com/advisories/22639 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200609-12.xml
http://securitytracker.com/id?1016808
http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295 Patch
http://svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923 Patch
http://www.mandriva.com/security/advisories?name=MDKSA-2006:165
http://www.novell.com/linux/security/advisories/2006_25_sr.html
http://www.securityfocus.com/bid/19831
http://www.ubuntu.com/usn/usn-345-1
http://www.vupen.com/english/advisories/2006/3446
https://exchange.xforce.ibmcloud.com/vulnerabilities/28732
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9912
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:mailman:2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.1:beta1:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1b1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:12

Type Values Removed Values Added
References () http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html - () http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html -
References () http://rhn.redhat.com/errata/RHSA-2006-0600.html - () http://rhn.redhat.com/errata/RHSA-2006-0600.html -
References () http://secunia.com/advisories/21732 - Patch, Vendor Advisory () http://secunia.com/advisories/21732 - Patch, Vendor Advisory
References () http://secunia.com/advisories/21792 - Vendor Advisory () http://secunia.com/advisories/21792 - Vendor Advisory
References () http://secunia.com/advisories/21837 - Vendor Advisory () http://secunia.com/advisories/21837 - Vendor Advisory
References () http://secunia.com/advisories/21879 - Vendor Advisory () http://secunia.com/advisories/21879 - Vendor Advisory
References () http://secunia.com/advisories/22011 - Vendor Advisory () http://secunia.com/advisories/22011 - Vendor Advisory
References () http://secunia.com/advisories/22020 - Vendor Advisory () http://secunia.com/advisories/22020 - Vendor Advisory
References () http://secunia.com/advisories/22639 - Vendor Advisory () http://secunia.com/advisories/22639 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200609-12.xml - () http://security.gentoo.org/glsa/glsa-200609-12.xml -
References () http://securitytracker.com/id?1016808 - () http://securitytracker.com/id?1016808 -
References () http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295 - Patch () http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295 - Patch
References () http://svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923 - Patch () http://svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923 - Patch
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:165 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:165 -
References () http://www.novell.com/linux/security/advisories/2006_25_sr.html - () http://www.novell.com/linux/security/advisories/2006_25_sr.html -
References () http://www.securityfocus.com/bid/19831 - () http://www.securityfocus.com/bid/19831 -
References () http://www.ubuntu.com/usn/usn-345-1 - () http://www.ubuntu.com/usn/usn-345-1 -
References () http://www.vupen.com/english/advisories/2006/3446 - () http://www.vupen.com/english/advisories/2006/3446 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28732 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28732 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9912 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9912 -

Information

Published : 2006-09-06 00:04

Updated : 2024-11-21 00:12


NVD link : CVE-2006-2941

Mitre link : CVE-2006-2941

CVE.ORG link : CVE-2006-2941


JSON object : View

Products Affected

gnu

  • mailman