Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56890
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1090-1)
Summary:The remote host is missing an update for the Debian 'spamassassin' package(s) announced via the DSA-1090-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'spamassassin' package(s) announced via the DSA-1090-1 advisory.

Vulnerability Insight:
A vulnerability has been discovered in SpamAssassin, a Perl-based spam filter using text analysis, that can allow remote attackers to execute arbitrary commands. This problem only affects systems where spamd is reachable via the internet and used with vpopmail virtual users, via the '-v' / '--vpopmail' switch, and with the '-P' / '--paranoid' switch which is not the default setting on Debian.

The old stable distribution (woody) is not affected by this problem.

For the stable distribution (sarge) this problem has been fixed in version 3.0.3-2sarge1.

For the volatile archive for the stable distribution (sarge) this problem has been fixed in version 3.1.0a-0volatile3.

For the unstable distribution (sid) this problem has been fixed in version 3.1.3-1.

We recommend that you upgrade your spamd package.

Affected Software/OS:
'spamassassin' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
5.1

CVSS Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-2447
1016230
http://securitytracker.com/id?1016230
1016235
http://securitytracker.com/id?1016235
18290
http://www.securityfocus.com/bid/18290
2006-0034
http://www.trustix.org/errata/2006/0034/
20060607 rPSA-2006-0096-1 spamassassin
http://www.securityfocus.com/archive/1/436288/100/0/threaded
20430
http://secunia.com/advisories/20430
20443
http://secunia.com/advisories/20443
20482
http://secunia.com/advisories/20482
20531
http://secunia.com/advisories/20531
20566
http://secunia.com/advisories/20566
20692
http://secunia.com/advisories/20692
ADV-2006-2148
http://www.vupen.com/english/advisories/2006/2148
DSA-1090
http://www.debian.org/security/2006/dsa-1090
GLSA-200606-09
http://www.gentoo.org/security/en/glsa/glsa-200606-09.xml
MDKSA-2006:103
http://www.mandriva.com/security/advisories?name=MDKSA-2006:103
RHSA-2006:0543
http://www.redhat.com/support/errata/RHSA-2006-0543.html
http://www.nabble.com/ANNOUNCE%3A-Apache-SpamAssassin-3.1.3-available%21-t1736096.html
oval:org.mitre.oval:def:9184
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9184
spamassassin-spamd-command-execution(27008)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27008
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.