ID CVE-2005-4591
Summary Heap-based buffer overflow in bogofilter 0.96.2, 0.95.2, 0.94.14, 0.94.12, and other versions from 0.93.5 to 0.96.2, when using Unicode databases, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "invalid input sequences" that lead to heap corruption when bogofilter or bogolexer converts character sets.
References
Vulnerable Configurations
  • cpe:2.3:o:bogofilter:email_filter:0.93.5
    cpe:2.3:o:bogofilter:email_filter:0.93.5
  • cpe:2.3:o:bogofilter:email_filter:0.94.12
    cpe:2.3:o:bogofilter:email_filter:0.94.12
  • cpe:2.3:o:bogofilter:email_filter:0.94.14
    cpe:2.3:o:bogofilter:email_filter:0.94.14
  • cpe:2.3:o:bogofilter:email_filter:0.95.2
    cpe:2.3:o:bogofilter:email_filter:0.95.2
  • cpe:2.3:o:bogofilter:email_filter:0.96.2
    cpe:2.3:o:bogofilter:email_filter:0.96.2
CVSS
Base: 7.5 (as of 11-01-2006 - 14:30)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_92140BC97BDE11DA8EC40002B3B60E4C.NASL
    description Matthias Andree reports : When using Unicode databases (default in more recent bogofilter installations), upon encountering invalid input sequences, bogofilter or bogolexer could overrun a malloc()'d buffer, corrupting the heap, while converting character sets. Bogofilter would usually be processing untrusted data received from the network at that time. This problem was aggravated by an unrelated bug that made bogofilter process binary attachments as though they were text, and attempt charset conversion on them. Given the MIME default character set, US-ASCII, all input octets in the range 0x80...0xff were considered invalid input sequences and could trigger the heap corruption.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 21475
    published 2006-05-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21475
    title FreeBSD : bogofilter -- heap corruption through malformed input (92140bc9-7bde-11da-8ec4-0002b3b60e4c)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-240-1.NASL
    description A buffer overflow was found in bogofilter's character set conversion handling. Certain invalid UTF-8 character sequences caused an invalid memory access. By sending a specially crafted email, a remote attacker could exploit this to crash bogofilter or possibly even execute arbitrary code with bogofilter's privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-08-15
    plugin id 20787
    published 2006-01-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20787
    title Ubuntu 5.10 : bogofilter vulnerability (USN-240-1)
refmap via4
bid 16171
confirm http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-01
secunia
  • 18352
  • 18427
  • 18717
suse SUSE-SR:2006:003
ubuntu USN-240-1
vupen ADV-2006-0100
xf bogofilter-unicode-bo(24118)
Last major update 07-03-2011 - 21:28
Published 31-12-2005 - 00:00
Last modified 03-10-2018 - 17:34
Back to Top