First published: Wed Mar 03 2004(Updated: )
Unknown vulnerability in the mail command handler in Mailman before 2.0.14 allows remote attackers to cause a denial of service (crash) via malformed e-mail commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mailman | =2.0.5 | |
Mailman | =2.0.1 | |
Mailman | =2.0.11 | |
Mailman | =2.0.6 | |
Mailman | =2.0-beta3 | |
Mailman | =1.1 | |
Mailman | =2.0-beta5 | |
Mailman | =2.0.12 | |
Mailman | =2.0 | |
Mailman | =1.0 | |
Mailman | =2.0.13 | |
Mailman | =2.0.2 | |
Mailman | =2.0.3 | |
Mailman | =2.0-beta4 | |
Mailman | =2.0.4 | |
Mailman | =2.0.8 | |
Mailman | =2.0.9 | |
Mailman | =2.1 | |
Mailman | =2.0.10 | |
Mailman | =2.0.7 | |
SGI ProPack | =2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0991 has a severity rating indicating it can lead to a denial of service due to crashing the Mailman application.
To fix CVE-2003-0991, upgrade Mailman to version 2.0.14 or later, which addresses the vulnerability.
CVE-2003-0991 affects multiple versions of Mailman prior to 2.0.14, including version 1.0, 1.1, and several 2.0.x versions.
CVE-2003-0991 involves a remote denial of service attack initiated via malformed email commands sent to the Mailman handler.
Using Mailman versions before 2.0.14 is not safe due to the vulnerability identified in CVE-2003-0991, as they are susceptible to denial of service attacks.