ID CVE-2006-0052
Summary The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary.
References
Vulnerable Configurations
  • GNU Mailman 1.0
    cpe:2.3:a:gnu:mailman:1.0
  • GNU Mailman 1.1
    cpe:2.3:a:gnu:mailman:1.1
  • GNU Mailman 2.0
    cpe:2.3:a:gnu:mailman:2.0
  • GNU Mailman 2.0 beta3
    cpe:2.3:a:gnu:mailman:2.0:beta3
  • GNU Mailman 2.0 beta4
    cpe:2.3:a:gnu:mailman:2.0:beta4
  • GNU Mailman 2.0 beta5
    cpe:2.3:a:gnu:mailman:2.0:beta5
  • GNU Mailman 2.0.1
    cpe:2.3:a:gnu:mailman:2.0.1
  • GNU Mailman 2.0.2
    cpe:2.3:a:gnu:mailman:2.0.2
  • GNU Mailman 2.0.3
    cpe:2.3:a:gnu:mailman:2.0.3
  • GNU Mailman 2.0.4
    cpe:2.3:a:gnu:mailman:2.0.4
  • GNU Mailman 2.0.5
    cpe:2.3:a:gnu:mailman:2.0.5
  • GNU Mailman 2.0.6
    cpe:2.3:a:gnu:mailman:2.0.6
  • GNU Mailman 2.0.7
    cpe:2.3:a:gnu:mailman:2.0.7
  • GNU Mailman 2.0.8
    cpe:2.3:a:gnu:mailman:2.0.8
  • GNU Mailman 2.0.9
    cpe:2.3:a:gnu:mailman:2.0.9
  • GNU Mailman 2.0.10
    cpe:2.3:a:gnu:mailman:2.0.10
  • GNU Mailman 2.0.11
    cpe:2.3:a:gnu:mailman:2.0.11
  • GNU Mailman 2.0.12
    cpe:2.3:a:gnu:mailman:2.0.12
  • GNU Mailman 2.0.13
    cpe:2.3:a:gnu:mailman:2.0.13
  • GNU Mailman 2.0.14
    cpe:2.3:a:gnu:mailman:2.0.14
  • GNU Mailman 2.1
    cpe:2.3:a:gnu:mailman:2.1
  • GNU Mailman 2.1.1
    cpe:2.3:a:gnu:mailman:2.1.1
  • GNU Mailman 2.1.2
    cpe:2.3:a:gnu:mailman:2.1.2
  • GNU Mailman 2.1.3
    cpe:2.3:a:gnu:mailman:2.1.3
  • GNU Mailman 2.1.4
    cpe:2.3:a:gnu:mailman:2.1.4
  • GNU Mailman 2.1.5
    cpe:2.3:a:gnu:mailman:2.1.5
  • GNU Mailman 2.1b1
    cpe:2.3:a:gnu:mailman:2.1b1
CVSS
Base: 5.0 (as of 31-03-2006 - 13:51)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2006-061.NASL
    description Scrubber.py, in Mailman 2.1.5 and earlier, when using email 2.5 (part of Python), is susceptible to a DoS (mailman service stops delivering for the list in question) if it encounters a badly formed mime multipart message with only one part and that part has two blank lines between the first boundary and the end boundary. Updated packages have been patched to correct this issue.
    last seen 2017-10-29
    modified 2012-09-07
    plugin id 21176
    published 2006-04-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21176
    title MDKSA-2006:061 : mailman
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-267-1.NASL
    description A remote Denial of Service vulnerability was discovered in the decoder for multipart messages. Certain parts of type 'message/delivery-status' or parts containing only two blank lines triggered an exception. An attacker could exploit this to crash Mailman by sending a specially crafted email to a mailing list. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-08-15
    plugin id 21184
    published 2006-04-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21184
    title Ubuntu 4.10 / 5.04 / 5.10 : mailman vulnerability (USN-267-1)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2006-0486.NASL
    description An updated mailman package that fixes a denial of service flaw is now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mailman is software to help manage email discussion lists. A flaw was found in the way Mailman handles MIME multipart messages. An attacker could send a carefully crafted MIME multipart email message to a mailing list run by Mailman which would cause that particular mailing list to stop working. (CVE-2006-0052) Users of Mailman should upgrade to this updated package, which contains backported patches to correct this issue.
    last seen 2019-02-21
    modified 2018-11-16
    plugin id 21682
    published 2006-06-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21682
    title RHEL 3 / 4 : mailman (RHSA-2006:0486)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1027.NASL
    description A potential denial of service problem has been discovered in mailman, the web-based GNU mailing list manager. The (failing) parsing of messages with malformed mime multiparts sometimes caused the whole mailing list to become inoperative. The old stable distribution (woody) is not vulnerable to this issue.
    last seen 2019-02-21
    modified 2018-08-09
    plugin id 22569
    published 2006-10-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=22569
    title Debian DSA-1027-1 : mailman - programming error
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2006-0486.NASL
    description An updated mailman package that fixes a denial of service flaw is now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mailman is software to help manage email discussion lists. A flaw was found in the way Mailman handles MIME multipart messages. An attacker could send a carefully crafted MIME multipart email message to a mailing list run by Mailman which would cause that particular mailing list to stop working. (CVE-2006-0052) Users of Mailman should upgrade to this updated package, which contains backported patches to correct this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 21901
    published 2006-07-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21901
    title CentOS 3 / 4 : mailman (CESA-2006:0486)
oval via4
accepted 2013-04-29T04:19:39.835-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary.
family unix
id oval:org.mitre.oval:def:9475
status accepted
submitted 2010-07-09T03:56:16-04:00
title The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary.
version 23
redhat via4
advisories
bugzilla
id 187420
title CVE-2006-0052 Mailman DoS
oval
OR
  • AND
    comment Red Hat Enterprise Linux 3 is installed
    oval oval:com.redhat.rhsa:tst:20060015001
  • AND
    comment Red Hat Enterprise Linux 4 is installed
    oval oval:com.redhat.rhsa:tst:20060016001
rhsa
id RHSA-2006:0486
released 2006-06-09
severity Moderate
title RHSA-2006:0486: mailman security update (Moderate)
refmap via4
bid 17311
confirm http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358892
debian DSA-1027
mandriva MDKSA-2006:061
osvdb 24367
sectrack 1015851
secunia
  • 19522
  • 19545
  • 19571
  • 20624
  • 20782
sgi 20060602-01-U
suse SUSE-SR:2006:008
ubuntu USN-267-1
Last major update 21-08-2010 - 00:37
Published 31-03-2006 - 06:06
Last modified 03-10-2018 - 17:34
Back to Top