Vulnerability Description
Format string vulnerability in Mailman before 2.1.9 allows attackers to execute arbitrary code via unspecified vectors. NOTE: the vendor has disputed this vulnerability, stating that it is "unexploitable.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Mailman | <= 2.1.8 |
References
- http://mail.python.org/pipermail/mailman-announce/2006-September/000087.htmlPatch
- http://people.debian.org/~terpstra/message/20060906.155339.0c0732a4.en.html
- http://secunia.com/advisories/21732
- http://secunia.com/advisories/22639
- http://www.novell.com/linux/security/advisories/2006_25_sr.html
- http://mail.python.org/pipermail/mailman-announce/2006-September/000087.htmlPatch
- http://people.debian.org/~terpstra/message/20060906.155339.0c0732a4.en.html
- http://secunia.com/advisories/21732
- http://secunia.com/advisories/22639
- http://www.novell.com/linux/security/advisories/2006_25_sr.html
FAQ
What is CVE-2006-2191?
CVE-2006-2191 is a vulnerability with a CVSS score of 7.5 (HIGH). Format string vulnerability in Mailman before 2.1.9 allows attackers to execute arbitrary code via unspecified vectors. NOTE: the vendor has disputed this vulnerability, stating that it is "unexploita...
How severe is CVE-2006-2191?
CVE-2006-2191 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2191?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Mailman.