From d6ad0e606c00041ae82e0e79fd2d44dfc5a2d400 Mon Sep 17 00:00:00 2001 From: nectar Date: Wed, 1 Jun 2005 15:51:40 +0000 Subject: Document vulnerability in set-user-ID sympa application. --- security/vuxml/vuln.xml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index c3fd41e45fe3..b0d8be406eea 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,34 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + sympa -- buffer overflow in "queue" + + + sympa + 4.1.2_1 + + + + +

Erik Sjölund discovered a vulnerabilitiy in Sympa. The + queue application processes messages received via + aliases. It contains a buffer overflow in the usage of + sprintf. In some configurations, it may allow an + attacker to execute arbitrary code as the sympa + user.

+ +
+ + CAN-2005-0073 + http://www.debian.org/security/2005/dsa-677 + + + 2005-02-11 + 2005-06-01 + +
+ mailman -- generated passwords are poor quality -- cgit