Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2004-1143


The password generation in mailman before 2.1.5 generates only 5 million unique passwords, which makes it easier for remote attackers to guess passwords via a brute force attack.


Published

2004-12-31T05:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application gnu mailman 1.0 Yes
Application gnu mailman 1.1 Yes
Application gnu mailman 2.0 Yes
Application gnu mailman 2.0 Yes
Application gnu mailman 2.0 Yes
Application gnu mailman 2.0 Yes
Application gnu mailman 2.0.1 Yes
Application gnu mailman 2.0.2 Yes
Application gnu mailman 2.0.3 Yes
Application gnu mailman 2.0.4 Yes
Application gnu mailman 2.0.5 Yes
Application gnu mailman 2.0.6 Yes
Application gnu mailman 2.0.7 Yes
Application gnu mailman 2.0.8 Yes
Application gnu mailman 2.0.9 Yes
Application gnu mailman 2.0.10 Yes
Application gnu mailman 2.0.11 Yes
Application gnu mailman 2.0.12 Yes
Application gnu mailman 2.0.13 Yes
Application gnu mailman 2.1 Yes
Application gnu mailman 2.1.1 Yes
Application gnu mailman 2.1.2 Yes
Application gnu mailman 2.1.3 Yes
Application gnu mailman 2.1.4 Yes
Application gnu mailman 2.1b1 Yes

References