Korean
<< Back
VID 23170
Severity 40
Port 783
Protocol TCP
Class Daemon
Detailed Description The SpamAssassin is vulnerable to a command execution vulnerability which exists in versions prior to 3.0.6 or 3.1.3. SpamAssassin is a widely-deployed open source project that serves as a mail filter to identify Spam mail. SpamAssassin versions 3.0.x prior to 3.0.6 or 3.1.x prior to 3.1.3 are vulnerable to arbitrary command execution vulnerability. If spamd of SpamAssassin is executed with the --vpopmail (-v) and --paranoid (-P) switches, a remote attacker could exploit this vulnerability to execute arbitrary commands with the privileges of "spamd" by sending a specially-crafted email to an affected application.

* References:
http://www.frsirt.com/english/advisories/2006/2148
http://rhn.redhat.com/errata/RHSA-2006-0543.html
http://www.nabble.com/forum/ViewPost.jtp?post=4717543
http://www.nabble.com/forum/ViewPost.jtp?post=4717572
http://secunia.com/advisories/20430

* Platforms Affected:
SpamAssassin versions prior to 3.0.6
SpamAssassin versions prior to 3.1.3
Red Hat Desktop Ver.4
Red Hat Enterprise Linux AS Ver.4
Red Hat Enterprise Linux ES Ver.4
Red Hat Enterprise Linux WS Ver.4
Recommendation Upgrade to the latest version of SpamAssassin (3.0.6 or 3.1.3 or later), available from the Apache SpamAssassin Project Download Web page at http://spamassassin.apache.org/downloads.cgi?update=200606050750
Related URL CVE-2006-2447 (CVE)
Related URL 18290 (SecurityFocus)
Related URL 27008 (ISS)