CVE-2005-4153 (GCVE-0-2005-4153)
Vulnerability from cvelistv5
Published
2005-12-11 02:00
Modified
2024-08-07 23:38
Severity ?
CWE
  • n/a
Summary
Mailman 2.1.4 through 2.1.6 allows remote attackers to cause a denial of service via a message that causes the server to "fail with an Overflow on bad date data in a processed message," a different vulnerability than CVE-2005-3573.
References
cve@mitre.org ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
cve@mitre.org http://secunia.com/advisories/18449 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/18456 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/18612 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/19167 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/19196 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/19532 Vendor Advisory
cve@mitre.org http://www.debian.org/security/2006/dsa-955
cve@mitre.org http://www.osvdb.org/21723
cve@mitre.org http://www.redhat.com/support/errata/RHSA-2006-0204.html
cve@mitre.org http://www.securityfocus.com/bid/16248
cve@mitre.org http://www.trustix.org/errata/2006/0012/
cve@mitre.org http://www.ubuntu.com/usn/usn-242-1
cve@mitre.org http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222 Patch, Vendor Advisory
cve@mitre.org https://exchange.xforce.ibmcloud.com/vulnerabilities/23139
cve@mitre.org https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10660
af854a3a-2127-422b-91ae-364da2661108 ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/18449 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/18456 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/18612 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/19167 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/19196 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/19532 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2006/dsa-955
af854a3a-2127-422b-91ae-364da2661108 http://www.osvdb.org/21723
af854a3a-2127-422b-91ae-364da2661108 http://www.redhat.com/support/errata/RHSA-2006-0204.html
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/16248
af854a3a-2127-422b-91ae-364da2661108 http://www.trustix.org/errata/2006/0012/
af854a3a-2127-422b-91ae-364da2661108 http://www.ubuntu.com/usn/usn-242-1
af854a3a-2127-422b-91ae-364da2661108 http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222 Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/23139
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10660
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:38:50.410Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19167",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19167"
          },
          {
            "name": "USN-242-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-242-1"
          },
          {
            "name": "16248",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16248"
          },
          {
            "name": "20060401-01-U",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U"
          },
          {
            "name": "2006-0012",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0012/"
          },
          {
            "name": "RHSA-2006:0204",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2006-0204.html"
          },
          {
            "name": "oval:org.mitre.oval:def:10660",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10660"
          },
          {
            "name": "mailman-utf8-scrubber-dos(23139)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23139"
          },
          {
            "name": "18456",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18456"
          },
          {
            "name": "19532",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19532"
          },
          {
            "name": "MDKSA-2005:222",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222"
          },
          {
            "name": "18449",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18449"
          },
          {
            "name": "18612",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18612"
          },
          {
            "name": "21723",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21723"
          },
          {
            "name": "19196",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19196"
          },
          {
            "name": "DSA-955",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-955"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Mailman 2.1.4 through 2.1.6 allows remote attackers to cause a denial of service via a message that causes the server to \"fail with an Overflow on bad date data in a processed message,\" a different vulnerability than CVE-2005-3573."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19167",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19167"
        },
        {
          "name": "USN-242-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-242-1"
        },
        {
          "name": "16248",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16248"
        },
        {
          "name": "20060401-01-U",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U"
        },
        {
          "name": "2006-0012",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0012/"
        },
        {
          "name": "RHSA-2006:0204",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2006-0204.html"
        },
        {
          "name": "oval:org.mitre.oval:def:10660",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10660"
        },
        {
          "name": "mailman-utf8-scrubber-dos(23139)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23139"
        },
        {
          "name": "18456",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18456"
        },
        {
          "name": "19532",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19532"
        },
        {
          "name": "MDKSA-2005:222",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222"
        },
        {
          "name": "18449",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18449"
        },
        {
          "name": "18612",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18612"
        },
        {
          "name": "21723",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21723"
        },
        {
          "name": "19196",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19196"
        },
        {
          "name": "DSA-955",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-955"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4153",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Mailman 2.1.4 through 2.1.6 allows remote attackers to cause a denial of service via a message that causes the server to \"fail with an Overflow on bad date data in a processed message,\" a different vulnerability than CVE-2005-3573."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19167",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19167"
            },
            {
              "name": "USN-242-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-242-1"
            },
            {
              "name": "16248",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16248"
            },
            {
              "name": "20060401-01-U",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U"
            },
            {
              "name": "2006-0012",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0012/"
            },
            {
              "name": "RHSA-2006:0204",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2006-0204.html"
            },
            {
              "name": "oval:org.mitre.oval:def:10660",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10660"
            },
            {
              "name": "mailman-utf8-scrubber-dos(23139)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23139"
            },
            {
              "name": "18456",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18456"
            },
            {
              "name": "19532",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19532"
            },
            {
              "name": "MDKSA-2005:222",
              "refsource": "MANDRIVA",
              "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222"
            },
            {
              "name": "18449",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18449"
            },
            {
              "name": "18612",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18612"
            },
            {
              "name": "21723",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21723"
            },
            {
              "name": "19196",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19196"
            },
            {
              "name": "DSA-955",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-955"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4153",
    "datePublished": "2005-12-11T02:00:00",
    "dateReserved": "2005-12-11T00:00:00",
    "dateUpdated": "2024-08-07T23:38:50.410Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2005-4153\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-12-11T02:03:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mailman 2.1.4 through 2.1.6 allows remote attackers to cause a denial of service via a message that causes the server to \\\"fail with an Overflow on bad date data in a processed message,\\\" a different vulnerability than CVE-2005-3573.\"},{\"lang\":\"es\",\"value\":\"Mailman 2.1.4 a 2.1.6 permite a atacantes remotos causar una denegaci\u00f3n de servicio mediante un mensaje que causa que el servidor \\\"falle con un desbordamiento en datos de fecha incorrectos en un mensaje procesado\\\", una vulnerabilidad diferente de CVE-2005-3572.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:mailman:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"643610C6-99A9-43C9-A8FC-463A244C08DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:mailman:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C53260-503F-4934-B1FE-9FACD8E0EE66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:mailman:2.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A34CBFC5-CB18-4FE4-9B4D-F3280CBCCD6C\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18449\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18456\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18612\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19167\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19196\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19532\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2006/dsa-955\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/21723\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0204.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/16248\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.trustix.org/errata/2006/0012/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-242-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/23139\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10660\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18449\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18456\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18612\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19196\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19532\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2006/dsa-955\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/21723\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0204.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/16248\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.trustix.org/errata/2006/0012/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-242-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/23139\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10660\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…