Linux Security
    Linux Security
    Linux Security

    Debian: mailman vulnerability

    Posted By
    Exploit exists that could result in a malicious user obtaining group mailman permission.
    Hash: SHA1
    - ----------------------------------------------------------------------------
    Debian Security Advisory                                 This email address is being protected from spambots. You need JavaScript enabled to view it.                               Martin Schulze
    August 5, 2000
    - ----------------------------------------------------------------------------
    Package: mailman
    Vulnerability: local mailman group exploit
    Debian-specific: no
    Former versions of mailman v2.0 came with a security problem,
    introduced during the 2.0 beta cycle, that could be exploited by
    clever local users to gain group mailman permission.  No exploit does
    exist at the moment, though.
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    Debian GNU/Linux 2.1 alias slink
    - --------------------------------
      Slink comes with version 1.0 that is not vulnerable.
    Debian 2.2 alias potato
    - -----------------------
      Potato comes with version 1.1 that is not vulnerable.
    Debian Unstable alias woody
    - ---------------------------
      This version of Debian is not yet released and reflects the current
      development release.  Fixes are currently available for Intel ia32
      and Motorola 680x0.  Fixes for other architectures will be available
      soon.  In doubt, please recompile the package from source on your
      Source archives:
          MD5 checksum: 177e666144c35d6b945b30dddf567fef
          MD5 checksum: 431d66e4ef496ce48463ed55193d375c
          MD5 checksum: 2c2602b7745a56adecd4f24fdd6d446f
      Intel ia32 architecture:
          MD5 checksum: e2a071bf4a9a3be02978df47ed58acb6
      Motorola 680x0 architecture:
          MD5 checksum: 8bb6367c1e249beaaaa8eb3b7fc71c27
    - ----------------------------------------------------------------------------
    For apt-get: deb stable updates
    For dpkg-ftp: dists/stable/updates
    Mailing list: debian-security-This email address is being protected from spambots. You need JavaScript enabled to view it.
    Version: GnuPG v1.0.1 (GNU/Linux)
    Comment: For info see
    -----END PGP SIGNATURE-----

    LinuxSecurity Poll

    Which statement best describes how you feel about the recent Linux 5.9 release?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"140","title":"Not a game-changer for me.","votes":"2","type":"x","order":"1","pct":22.22,"resources":[]},{"id":"141","title":"I'm happy with the performance improvements it offers.","votes":"7","type":"x","order":"2","pct":77.78,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.