GNU Mailman Local Format String Vulnerability

A vulnerability exists in the GNU Mailman list package. Versions 2.0beta3 and 2.0beta4 contain a vulnerability which can yield group mailman access. By supplying a well formed string, containing format strings, it may be possible to overwrite values on the stack of the running process, and execute arbitrary commands with the privileges of the 'wrapper' program. This program is installed setgid mailman. Upon acquiring GID mailman, it may be possible for an attacker to modify other binaries, and further elevate access.


 

Privacy Statement
Copyright 2010, SecurityFocus