CERT mailing list archives

Current Activity - Majordomo Vulnerable to Directory Traversal


From: Current Activity <us-cert () us-cert gov>
Date: Fri, 4 Feb 2011 12:43:02 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

US-CERT Current Activity

Majordomo Vulnerable to Directory Traversal

Original release date: February 4, 2011 at 12:11 pm
Last revised: February 4, 2011 at 12:11 pm


US-CERT is aware of  a vulnerability affecting Majordomo 2.
Exploitation of this vulnerability may allow an attacker to obtain
sensitive information that could be used to leverage additional
attacks.  Reports indicate that this vulnerability affects builds
20110121 and prior.

US-CERT encourages users and administrators to upgrade to Majordomo 2
build 20110125 and later.  Additional information regarding this
vulnerability can be found in this Sitewatch Advisory.

Relevant Url(s):
<https://sitewat.ch/en/Advisory/View/1>

<http://www.h-online.com/security/news/item/Mailing-list-application-Majordomo-reveals-file-content-1183034.html>

====
This entry is available at
http://www.us-cert.gov/current/index.html#majordomo_vulnerable_to_directory_traversal

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBTUw6eT6pPKYJORa3AQK4aQf/Zr5SNppfljJRvXXcx6htTiYyWTm+xKtM
nvDHE3OMfulIHBMRhG4fKA3kTGNvpiMQW4peu7972QGbq2hhLa1zT52wfpu9IV6g
baPQAdGqPQbJpyXtdKEbUI8eGkjho6/vlD/3yl5mFQyJcSmRPdwJwnsMQ+uiFyYa
YprM15wuiOUKIEJEY2dxLeC+GMa1pUQ0b5ZDgBvvqk5sT5RFG6qbA45KJG2nuLNh
qZbN583p57BKPa8CFWyVt0xuoqxCRbgu9j6L0VGUrXADTBKSu85iwmOS8NKTNeKt
UbKOYb7XRluXPLS/I6hw+HjkQythpKK4fJwMTdoVsxAAESeobLkgLA==
=kN1Y
-----END PGP SIGNATURE-----


Current thread: