Bug 205651 (CVE-2006-4624) - CVE-2006-4624 mailman logfile CRLF injection
Summary: CVE-2006-4624 mailman logfile CRLF injection
Alias: CVE-2006-4624
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Tomas Smetana
QA Contact:
Depends On: 251308 251309 251310
TreeView+ depends on / blocked
Reported: 2006-09-07 20:41 UTC by Josh Bressers
Modified: 2021-11-12 19:34 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2008-01-15 13:39:36 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0779 0 normal SHIPPED_LIVE Low: mailman security and bug fix update 2007-11-15 14:59:24 UTC

Description Josh Bressers 2006-09-07 20:41:03 UTC
mailman logfile CRLF injection

Text taken from MITRE:
CRLF injection vulnerability in Utils.py in Mailman before 2.1.9rc1
allows remote attackers to spoof messages in the error log and
possibly trick the administrator into visiting malicious URLs via a
carriage return/line feed sequences in the URI.

The fix for this issue is here:

This issue also affects RHEL3
This issue also affects RHEL2.1

Comment 1 RHEL Program Management 2007-05-09 09:41:28 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update

Comment 8 Josh Bressers 2007-09-05 21:02:22 UTC
The risks associated with fixing this bug are greater than the low severity
security risk. We therefore currently have no plans to fix this flaw in Red Hat
Enterprise Linux 2.1 and 3 which are in maintenance mode.

This bug will be addressed in a future update of Red Hat Enterprise Linux 4.

If you believe this judgement to be in error, please reopen this bug with an
appropriate comment.

Comment 10 Red Hat Product Security 2008-01-15 13:39:36 UTC
This issue was addressed in:

Red Hat Enterprise Linux:

Note You need to log in before you can comment on or make changes to this bug.