2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-3573" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-11-16T07:42:00.000" ,
"lastModified" : "2017-10-11T01:30:26.750" ,
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Scrubber.py in Mailman 2.1.5-8 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote attackers to cause a denial of service (application crash)."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 5.0
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0:beta3:*:*:*:*:*:*" ,
"matchCriteriaId" : "EC6B30F6-70A8-43C7-BA5C-6DD8A6ED829D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0:beta4:*:*:*:*:*:*" ,
"matchCriteriaId" : "767101D3-ABB0-4D34-AA28-75F78A392F39"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0:beta5:*:*:*:*:*:*" ,
"matchCriteriaId" : "BEB60D06-E9D0-4949-8542-334D180F491D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F884774-D1A1-42A6-A3FE-9B0500725666"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2C56B981-FD66-46F2-806A-3FFDEC520482"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5E3E1994-6CAC-48E9-8438-0D894A76FE66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB8742B0-A91D-457D-BF57-06AFC5219BF9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6F04EDBE-4B04-4B4C-A2BE-5286AC7C8952"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "615566E3-9EBD-49B3-9727-0883D3F0334B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F59D0CCF-3CD0-4D99-B1F1-38F331422801"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FADF5CE8-D072-4CFE-8A96-BA86187B478B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72278005-5F2A-4459-8813-DF7EC2D1F063"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4E39A909-E266-4BA9-87C6-DE26052433E9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ABA16FD9-0625-4D3D-9F10-130A28C88DA2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE33EFBF-E155-4C3B-93CC-63AA1266A8A2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78F2FB70-7EB9-4AA7-9E85-C151C3CC8104"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "47F9AC7B-C0EB-4B7F-8997-1491301D0EF0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B1D6A976-FFEA-4DB6-B002-8036E778C78E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1.1:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D3AFFFD-1BDC-4511-9DA0-56ACD337F56C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0B1500D8-952A-46C6-920C-096760C36A43"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "503D7346-4891-40B1-A0CD-0FACC5359431"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "643610C6-99A9-43C9-A8FC-463A244C08DE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "45C53260-503F-4934-B1FE-9FACD8E0EE66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1.5.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C670F583-6B60-4D80-A75F-CD53FDDF27D9"
}
]
}
]
}
] ,
"references" : [
{
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327732" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0003.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://mail.python.org/pipermail/mailman-users/2005-September/046523.html" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/17511" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/17874" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/18456" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/18503" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/18612" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/19167" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/19196" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/19532" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securitytracker.com/id?1015735" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.debian.org/security/2006/dsa-955" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/20819" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0204.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/15408" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.trustix.org/errata/2006/0012/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.ubuntu.com/usn/usn-242-1" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2005/2404" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23139" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10038" ,
"source" : "cve@mitre.org"
}
]
}