CVE-2006-0052

N/A Unknown
Published: March 31, 2006 Modified: April 16, 2026
View on NVD

Description

The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/19522
Source: security@debian.org
http://secunia.com/advisories/19545
Source: security@debian.org
http://secunia.com/advisories/19571
Source: security@debian.org
http://secunia.com/advisories/20624
Source: security@debian.org
http://secunia.com/advisories/20782
Source: security@debian.org
http://securitytracker.com/id?1015851
Source: security@debian.org
http://www.osvdb.org/24367
Source: security@debian.org
http://www.securityfocus.com/bid/17311
Source: security@debian.org
Patch
https://usn.ubuntu.com/267-1/
Source: security@debian.org
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358892
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://secunia.com/advisories/19522
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19545
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19571
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20624
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20782
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1015851
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1027
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:061
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2006_08_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/24367
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0486.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/17311
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://usn.ubuntu.com/267-1/
Source: af854a3a-2127-422b-91ae-364da2661108

32 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
6.4%
91th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

gnu