fkie_cve-2005-3573
Vulnerability from fkie_nvd
Published
2005-11-16 07:42
Modified
2024-11-21 00:02
Severity ?
Summary
Scrubber.py in Mailman 2.1.5-8 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote attackers to cause a denial of service (application crash).
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327732
cve@mitre.orghttp://lists.suse.com/archive/suse-security-announce/2006-Jan/0003.html
cve@mitre.orghttp://mail.python.org/pipermail/mailman-users/2005-September/046523.html
cve@mitre.orghttp://secunia.com/advisories/17511Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17874
cve@mitre.orghttp://secunia.com/advisories/18456
cve@mitre.orghttp://secunia.com/advisories/18503
cve@mitre.orghttp://secunia.com/advisories/18612
cve@mitre.orghttp://secunia.com/advisories/19167
cve@mitre.orghttp://secunia.com/advisories/19196
cve@mitre.orghttp://secunia.com/advisories/19532
cve@mitre.orghttp://securitytracker.com/id?1015735
cve@mitre.orghttp://www.debian.org/security/2006/dsa-955
cve@mitre.orghttp://www.osvdb.org/20819
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2006-0204.html
cve@mitre.orghttp://www.securityfocus.com/bid/15408
cve@mitre.orghttp://www.trustix.org/errata/2006/0012/
cve@mitre.orghttp://www.ubuntu.com/usn/usn-242-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2404
cve@mitre.orghttp://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/23139
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10038
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327732
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2006-Jan/0003.html
af854a3a-2127-422b-91ae-364da2661108http://mail.python.org/pipermail/mailman-users/2005-September/046523.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17511Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17874
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18456
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18503
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18612
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19167
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19196
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19532
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015735
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-955
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/20819
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0204.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15408
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0012/
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-242-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2404
af854a3a-2127-422b-91ae-364da2661108http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/23139
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10038
Impacted products
Vendor Product Version
gnu mailman 2.0
gnu mailman 2.0
gnu mailman 2.0
gnu mailman 2.0.1
gnu mailman 2.0.2
gnu mailman 2.0.3
gnu mailman 2.0.4
gnu mailman 2.0.5
gnu mailman 2.0.6
gnu mailman 2.0.7
gnu mailman 2.0.8
gnu mailman 2.0.9
gnu mailman 2.0.10
gnu mailman 2.0.11
gnu mailman 2.0.12
gnu mailman 2.0.13
gnu mailman 2.0.14
gnu mailman 2.1
gnu mailman 2.1.1
gnu mailman 2.1.2
gnu mailman 2.1.3
gnu mailman 2.1.4
gnu mailman 2.1.5
gnu mailman 2.1.5.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "EC6B30F6-70A8-43C7-BA5C-6DD8A6ED829D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "767101D3-ABB0-4D34-AA28-75F78A392F39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "BEB60D06-E9D0-4949-8542-334D180F491D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F884774-D1A1-42A6-A3FE-9B0500725666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56B981-FD66-46F2-806A-3FFDEC520482",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E3E1994-6CAC-48E9-8438-0D894A76FE66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB8742B0-A91D-457D-BF57-06AFC5219BF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F04EDBE-4B04-4B4C-A2BE-5286AC7C8952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "615566E3-9EBD-49B3-9727-0883D3F0334B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59D0CCF-3CD0-4D99-B1F1-38F331422801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FADF5CE8-D072-4CFE-8A96-BA86187B478B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "72278005-5F2A-4459-8813-DF7EC2D1F063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E39A909-E266-4BA9-87C6-DE26052433E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA16FD9-0625-4D3D-9F10-130A28C88DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE33EFBF-E155-4C3B-93CC-63AA1266A8A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F2FB70-7EB9-4AA7-9E85-C151C3CC8104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "47F9AC7B-C0EB-4B7F-8997-1491301D0EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1D6A976-FFEA-4DB6-B002-8036E778C78E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.1.1:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9D3AFFFD-1BDC-4511-9DA0-56ACD337F56C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1500D8-952A-46C6-920C-096760C36A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "503D7346-4891-40B1-A0CD-0FACC5359431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "643610C6-99A9-43C9-A8FC-463A244C08DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C53260-503F-4934-B1FE-9FACD8E0EE66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:mailman:2.1.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C670F583-6B60-4D80-A75F-CD53FDDF27D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Scrubber.py in Mailman 2.1.5-8 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote attackers to cause a denial of service (application crash)."
    }
  ],
  "id": "CVE-2005-3573",
  "lastModified": "2024-11-21T00:02:12.610",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-11-16T07:42:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327732"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0003.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://mail.python.org/pipermail/mailman-users/2005-September/046523.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17511"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17874"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18456"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18503"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18612"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19167"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19196"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19532"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015735"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-955"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/20819"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0204.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15408"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2006/0012/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-242-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2404"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23139"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10038"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mail.python.org/pipermail/mailman-users/2005-September/046523.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17511"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17874"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18456"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18503"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19196"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19532"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015735"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-955"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/20819"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0204.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15408"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2006/0012/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-242-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2404"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10038"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.