ID CVE-2004-1143
Summary The password generation in mailman before 2.1.5 generates only 5 million unique passwords, which makes it easier for remote attackers to guess passwords via a brute force attack.
References
Vulnerable Configurations
  • cpe:2.3:a:gnu:mailman:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0:beta4:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0:beta4:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0:beta5:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0:beta5:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:mailman:2.1b1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:mailman:2.1b1:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-07-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bugtraq 20050110 [USN-59-1] mailman vulnerabilities
confirm http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286796
secunia 13603
suse SUSE-SA:2005:007
xf mailman-weak-encryption(18857)
Last major update 11-07-2017 - 01:30
Published 31-12-2004 - 05:00
Last modified 11-07-2017 - 01:30
Back to Top