CVE-2005-3573
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/11/2005
Last modified:
03/04/2025
Description
Scrubber.py in Mailman 2.1.5-8 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote attackers to cause a denial of service (application crash).
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnu:mailman:2.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0:beta5:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.12:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327732
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0003.html
- http://mail.python.org/pipermail/mailman-users/2005-September/046523.html
- http://secunia.com/advisories/17511
- http://secunia.com/advisories/17874
- http://secunia.com/advisories/18456
- http://secunia.com/advisories/18503
- http://secunia.com/advisories/18612
- http://secunia.com/advisories/19167
- http://secunia.com/advisories/19196
- http://secunia.com/advisories/19532
- http://securitytracker.com/id?1015735=
- http://www.debian.org/security/2006/dsa-955
- http://www.osvdb.org/20819
- http://www.redhat.com/support/errata/RHSA-2006-0204.html
- http://www.securityfocus.com/bid/15408
- http://www.trustix.org/errata/2006/0012/
- http://www.ubuntu.com/usn/usn-242-1
- http://www.vupen.com/english/advisories/2005/2404
- http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005%3A222
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23139
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10038
- ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327732
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0003.html
- http://mail.python.org/pipermail/mailman-users/2005-September/046523.html
- http://secunia.com/advisories/17511
- http://secunia.com/advisories/17874
- http://secunia.com/advisories/18456
- http://secunia.com/advisories/18503
- http://secunia.com/advisories/18612
- http://secunia.com/advisories/19167
- http://secunia.com/advisories/19196
- http://secunia.com/advisories/19532
- http://securitytracker.com/id?1015735=
- http://www.debian.org/security/2006/dsa-955
- http://www.osvdb.org/20819
- http://www.redhat.com/support/errata/RHSA-2006-0204.html
- http://www.securityfocus.com/bid/15408
- http://www.trustix.org/errata/2006/0012/
- http://www.ubuntu.com/usn/usn-242-1
- http://www.vupen.com/english/advisories/2005/2404
- http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005%3A222
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23139
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10038



