2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2006-0052" ,
"sourceIdentifier" : "security@debian.org" ,
"published" : "2006-03-31T11:06:00.000" ,
2025-04-03 02:06:18 +00:00
"lastModified" : "2025-04-03T01:03:51.193" ,
"vulnStatus" : "Deferred" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "46CF8999-445E-4E03-89F1-81669F9F93D8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1D965E3E-E08C-40EA-AF66-470F473F0262"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "64179C1D-C96F-431F-AD80-CBCA77CB9E53"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0:beta3:*:*:*:*:*:*" ,
"matchCriteriaId" : "EC6B30F6-70A8-43C7-BA5C-6DD8A6ED829D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0:beta4:*:*:*:*:*:*" ,
"matchCriteriaId" : "767101D3-ABB0-4D34-AA28-75F78A392F39"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0:beta5:*:*:*:*:*:*" ,
"matchCriteriaId" : "BEB60D06-E9D0-4949-8542-334D180F491D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F884774-D1A1-42A6-A3FE-9B0500725666"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2C56B981-FD66-46F2-806A-3FFDEC520482"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5E3E1994-6CAC-48E9-8438-0D894A76FE66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB8742B0-A91D-457D-BF57-06AFC5219BF9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6F04EDBE-4B04-4B4C-A2BE-5286AC7C8952"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "615566E3-9EBD-49B3-9727-0883D3F0334B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F59D0CCF-3CD0-4D99-B1F1-38F331422801"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FADF5CE8-D072-4CFE-8A96-BA86187B478B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72278005-5F2A-4459-8813-DF7EC2D1F063"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4E39A909-E266-4BA9-87C6-DE26052433E9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ABA16FD9-0625-4D3D-9F10-130A28C88DA2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE33EFBF-E155-4C3B-93CC-63AA1266A8A2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78F2FB70-7EB9-4AA7-9E85-C151C3CC8104"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.0.14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "47F9AC7B-C0EB-4B7F-8997-1491301D0EF0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B1D6A976-FFEA-4DB6-B002-8036E778C78E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B8894855-E303-4B55-B3BC-DCBE3A0AB703"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0B1500D8-952A-46C6-920C-096760C36A43"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "503D7346-4891-40B1-A0CD-0FACC5359431"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "643610C6-99A9-43C9-A8FC-463A244C08DE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "45C53260-503F-4934-B1FE-9FACD8E0EE66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:mailman:2.1b1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "085C333C-E2E7-4ACD-9CC8-C37C67725954"
}
]
}
]
}
] ,
"references" : [
{
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc" ,
"source" : "security@debian.org"
} ,
{
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358892" ,
"source" : "security@debian.org" ,
"tags" : [
"Patch"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/19522" ,
"source" : "security@debian.org"
} ,
{
"url" : "http://secunia.com/advisories/19545" ,
"source" : "security@debian.org"
} ,
{
"url" : "http://secunia.com/advisories/19571" ,
"source" : "security@debian.org"
} ,
{
"url" : "http://secunia.com/advisories/20624" ,
"source" : "security@debian.org"
} ,
{
"url" : "http://secunia.com/advisories/20782" ,
"source" : "security@debian.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securitytracker.com/id?1015851" ,
"source" : "security@debian.org"
} ,
{
"url" : "http://www.debian.org/security/2006/dsa-1027" ,
"source" : "security@debian.org"
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:061" ,
"source" : "security@debian.org"
} ,
{
"url" : "http://www.novell.com/linux/security/advisories/2006_08_sr.html" ,
"source" : "security@debian.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/24367" ,
"source" : "security@debian.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0486.html" ,
"source" : "security@debian.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/17311" ,
"source" : "security@debian.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9475" ,
"source" : "security@debian.org"
} ,
{
"url" : "https://usn.ubuntu.com/267-1/" ,
"source" : "security@debian.org"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358892" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://secunia.com/advisories/19522" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/19545" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/19571" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/20624" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/20782" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://securitytracker.com/id?1015851" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.debian.org/security/2006/dsa-1027" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:061" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.novell.com/linux/security/advisories/2006_08_sr.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.osvdb.org/24367" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0486.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/17311" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9475" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://usn.ubuntu.com/267-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}