CERTA-2006-AVI-234
Vulnerability from certfr_avis
Une vulnérabilité a été publiée dans le logiciel anti-spam SpamAssassin. Elle permet l'éxécution de code arbitraire à distance.
Description
Pour que la vulnérabilité soit mise en oeuvre il est nécessaire que les directives -vpopmail et -paranoid soit activées dans le fichier de configuration. Il est à noter qu'il ne s'agit pas de la configuration par défaut.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SpamAssassin | SpamAssassin | 3.1.x. | ||
| SpamAssassin | SpamAssassin | 3.0.x; | ||
| SpamAssassin | SpamAssassin | 2.6.x; | ||
| SpamAssassin | SpamAssassin | 2.5.x; |
References
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "3.1.x.",
"product": {
"name": "SpamAssassin",
"vendor": {
"name": "SpamAssassin",
"scada": false
}
}
},
{
"description": "3.0.x;",
"product": {
"name": "SpamAssassin",
"vendor": {
"name": "SpamAssassin",
"scada": false
}
}
},
{
"description": "2.6.x;",
"product": {
"name": "SpamAssassin",
"vendor": {
"name": "SpamAssassin",
"scada": false
}
}
},
{
"description": "2.5.x;",
"product": {
"name": "SpamAssassin",
"vendor": {
"name": "SpamAssassin",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPour que la vuln\u00e9rabilit\u00e9 soit mise en oeuvre il est n\u00e9cessaire que les\ndirectives -vpopmail et -paranoid soit activ\u00e9es dans le fichier de\nconfiguration. Il est \u00e0 noter qu\u0027il ne s\u0027agit pas de la configuration\npar d\u00e9faut.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2006-06-12T00:00:00",
"last_revision_date": "2006-06-27T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0543 du 06 juin 2006 :",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0543.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200606-09 du 11 juin 2006 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200606-09.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2006:103 du 14 juin 2006 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:103"
},
{
"title": "Nouvelle version de SpamAssassin",
"url": "http://spamassassin.apache.org/downloads.cgi?update=200606050750"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1090 du 06 juin 2006 :",
"url": "http://www.debian.org/security/2006/dsa-1090"
}
],
"reference": "CERTA-2006-AVI-234",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2006-06-12T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Debian, RedHat, Gentoo et Mandriva.",
"revision_date": "2006-06-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 publi\u00e9e dans le logiciel anti-spam SpamAssassin.\nElle permet l\u0027\u00e9x\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans SpamAssassin",
"vendor_advisories": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…