You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa spamassassin

Sigurnosni nedostaci programskog paketa spamassassin

==========================================================================
Ubuntu Security Notice USN-4237-2
January 15, 2020

spamassassin vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in SpamAssassin.

Software Description:
– spamassassin: Perl-based spam filter using text analysis

Details:

USN-4237-1 fixed several vulnerabilities in SpamAssassin. This update provides
the corresponding update for Ubuntu 12.04 ESM and 14.04 ESM.

Original advisory details:

It was discovered that SpamAssassin incorrectly handled certain CF files.
If a user or automated system were tricked into using a specially-crafted
CF file, a remote attacker could possibly run arbitrary code.
(CVE-2018-11805)

It was discovered that SpamAssassin incorrectly handled certain messages.
A remote attacker could possibly use this issue to cause SpamAssassin to
consume resources, resulting in a denial of service. (CVE-2019-12420)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
spamassassin 3.4.2-0ubuntu0.14.04.1+esm1

Ubuntu 12.04 ESM:
spamassassin 3.4.2-0ubuntu0.12.04.3

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4237-2
https://usn.ubuntu.com/4237-1
CVE-2018-11805, CVE-2019-12420
—–BEGIN PGP SIGNATURE—–
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=y7Af
—–END PGP SIGNATURE—–

Top
More in Preporuke
Nadogradnja za .NET Core

Microsoft je izdao nadogradnju za otklanjanje ranjivosti u .NET Core komponenti (inačice 3.0 i 3.1). Potencijalni napadač bi ranjivost mogao...

Close