GEN:SID 1:2327
Message WEB-MISC bsml.pl access
Summary This event is generated when an attempt is made to exploit a known
vulnerability in BulletScript MailList CGI mailing list manager running on a server.
Impact Information gathering and possible theft of user information.
Detailed Information This event is generated when an attempt is made to exploit a known
vulnerability in BulletScript MailList CGI mailing list manager running on a server.
The script bsml.pl does not perform stringent checks when processing
input supplied via the action parameter to the script.

It may be possible for an attacker to compromise the integrity of the
database containing information pertaining to users of the mailing list
being managed.
Affected Systems All systems running BulletScript MailList.
Attack Scenarios An attacker can supply input of their choosing using the action
parameter.
Ease of Attack Simple. No exploit software required.
Corrective Action Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.
Additional References  
Rule References bugtraq: 9311
nessus: 11973