CVE-2005-3573
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
16/11/2005
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Scrubber.py in Mailman 2.1.5-8 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote attackers to cause a denial of service (application crash).
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:gnu:mailman:2.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0:beta5:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:mailman:2.0.12:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327732
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0003.html
- http://mail.python.org/pipermail/mailman-users/2005-September/046523.html
- http://secunia.com/advisories/17511
- http://secunia.com/advisories/17874
- http://secunia.com/advisories/18456
- http://secunia.com/advisories/18503
- http://secunia.com/advisories/18612
- http://secunia.com/advisories/19167
- http://secunia.com/advisories/19196
- http://secunia.com/advisories/19532
- http://securitytracker.com/id?1015735=
- http://www.debian.org/security/2006/dsa-955
- http://www.osvdb.org/20819
- http://www.redhat.com/support/errata/RHSA-2006-0204.html
- http://www.securityfocus.com/bid/15408
- http://www.trustix.org/errata/2006/0012/
- http://www.ubuntu.com/usn/usn-242-1
- http://www.vupen.com/english/advisories/2005/2404
- http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005%3A222
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23139
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10038
- ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327732
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0003.html
- http://mail.python.org/pipermail/mailman-users/2005-September/046523.html
- http://secunia.com/advisories/17511
- http://secunia.com/advisories/17874
- http://secunia.com/advisories/18456
- http://secunia.com/advisories/18503
- http://secunia.com/advisories/18612
- http://secunia.com/advisories/19167
- http://secunia.com/advisories/19196
- http://secunia.com/advisories/19532
- http://securitytracker.com/id?1015735=
- http://www.debian.org/security/2006/dsa-955
- http://www.osvdb.org/20819
- http://www.redhat.com/support/errata/RHSA-2006-0204.html
- http://www.securityfocus.com/bid/15408
- http://www.trustix.org/errata/2006/0012/
- http://www.ubuntu.com/usn/usn-242-1
- http://www.vupen.com/english/advisories/2005/2404
- http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005%3A222
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23139
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10038



