Short Name |
SMTP:MAILMAN:PASSWD-DISCLOSURE |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
SMTP |
Keywords |
Mailman Password Disclosure |
Release Date |
2004/05/26 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in Mailman, a free application for managing e-mail discussion and e-newsletter lists. If they know the e-mail address of a subscriber on a mailing list administered by Mailman, attackers can obtain the password for that subscriber.
Mailman is prone to an unspecified password retrieval vulnerability. This vulnerability was disclosed by the vendor. Reportedly, a remote attacker can gain access to user passwords, when the users subscribe to a mailing list. A remote attacker can use the sensitive information to hijack user accounts or carry out other attacks. Further information about this issue states that to exploit this vulnerability an attacker does not need to be subscribed to the list. The attacker needs to be able to mail <listname>-request@<listhost> and know the email address of a user to disclose the user's password. It is reported this issue affects Mailman 2.1.x versions. Due to a lack of details further information is not available at the moment. This BID will be updated as more information becomes available.