Vulnerability Name: | CVE-2001-1132 (CCN-7091) | ||||||||
Assigned: | 2001-09-05 | ||||||||
Published: | 2001-09-05 | ||||||||
Updated: | 2017-10-10 | ||||||||
Summary: | Mailman 2.0.x before 2.0.6 allows remote attackers to gain access to list administrative pages when there is an empty site or list password, which is not properly handled during the call to the crypt function during authentication. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: Conectiva Linux Announcement CLSA-2001:420 mailman Source: MITRE Type: CNA CVE-2001-1132 Source: CONECTIVA Type: UNKNOWN CLA-2001:420 Source: OSVDB Type: UNKNOWN 5455 Source: CCN Type: OSVDB ID: 5455 Mailman Administration Authentication Bypass Source: CCN Type: BID-3295 GNU Mailman Empty Password Blank Salt Vulnerability Source: XF Type: UNKNOWN mailman-blank-passwords(7091) Source: XF Type: UNKNOWN mailman-blank-passwords(7091) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |