Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59474
Category:Fedora Local Security Checks
Title:Fedora Core 5 FEDORA-2007-242 (spamassassin)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to spamassassin
announced via advisory FEDORA-2007-242.

SpamAssassin provides you with a way to reduce if not completely eliminate
Unsolicited Commercial Email (SPAM) from your incoming email. It can
be invoked by a MDA such as sendmail or postfix, or can be called from
a procmail script, .forward file, etc. It uses a genetic-algorithm
evolved scoring system to identify messages which look spammy, then
adds headers to the message so they can be filtered by the user's mail
reading software. This distribution includes the spamd/spamc components
which create a server that considerably speeds processing of mail.

To enable spamassassin, if you are receiving mail locally, simply add
this line to your ~
/.procmailrc:
INCLUDERC=/etc/mail/spamassassin/spamassassin-default.rc

To filter spam for all users, add that line to /etc/procmailrc
(creating if necessary).

Update Information:

This upgrades to version 3.1.8, which fixes some bugs and
CVE-2007-0451 Malformed HTML Denial of Service.

Solution: Apply the appropriate updates.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/

This update can be installed with the 'yum' update program. Use 'yum update
package-name' at the command line. For more information, refer to 'Managing
Software with yum,' available at http://fedora.redhat.com/docs/yum/.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-242

Risk factor : High

CVSS Score:
5.1

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-0451
1017666
http://www.securitytracker.com/id?1017666
22584
http://www.securityfocus.com/bid/22584
24197
http://secunia.com/advisories/24197
24200
http://secunia.com/advisories/24200
24250
http://secunia.com/advisories/24250
24256
http://secunia.com/advisories/24256
24265
http://secunia.com/advisories/24265
24307
http://secunia.com/advisories/24307
24889
http://secunia.com/advisories/24889
33207
http://osvdb.org/33207
ADV-2007-0628
http://www.vupen.com/english/advisories/2007/0628
FEDORA-2007-241
http://fedoranews.org/cms/node/2659
FEDORA-2007-242
http://fedoranews.org/cms/node/2657
GLSA-200703-02
http://security.gentoo.org/glsa/glsa-200703-02.xml
MDKSA-2007:049
http://www.mandriva.com/security/advisories?name=MDKSA-2007:049
RHSA-2007:0074
http://rhn.redhat.com/errata/RHSA-2007-0074.html
RHSA-2007:0075
http://www.redhat.com/support/errata/RHSA-2007-0075.html
SUSE-SR:2007:006
http://www.novell.com/linux/security/advisories/2007_6_sr.html
http://spamassassin.apache.org/advisories/cve-2007-0451.txt
http://svn.apache.org/repos/asf/spamassassin/branches/3.1/build/announcements/3.1.8.txt
https://issues.rpath.com/browse/RPL-1073
oval:org.mitre.oval:def:10018
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10018
spamassassin-url-dos(32536)
https://exchange.xforce.ibmcloud.com/vulnerabilities/32536
Common Vulnerability Exposure (CVE) ID: CVE-2006-2447
1016230
http://securitytracker.com/id?1016230
1016235
http://securitytracker.com/id?1016235
18290
http://www.securityfocus.com/bid/18290
2006-0034
http://www.trustix.org/errata/2006/0034/
20060607 rPSA-2006-0096-1 spamassassin
http://www.securityfocus.com/archive/1/436288/100/0/threaded
20430
http://secunia.com/advisories/20430
20443
http://secunia.com/advisories/20443
20482
http://secunia.com/advisories/20482
20531
http://secunia.com/advisories/20531
20566
http://secunia.com/advisories/20566
20692
http://secunia.com/advisories/20692
ADV-2006-2148
http://www.vupen.com/english/advisories/2006/2148
DSA-1090
http://www.debian.org/security/2006/dsa-1090
GLSA-200606-09
http://www.gentoo.org/security/en/glsa/glsa-200606-09.xml
MDKSA-2006:103
http://www.mandriva.com/security/advisories?name=MDKSA-2006:103
RHSA-2006:0543
http://www.redhat.com/support/errata/RHSA-2006-0543.html
http://www.nabble.com/ANNOUNCE%3A-Apache-SpamAssassin-3.1.3-available%21-t1736096.html
oval:org.mitre.oval:def:9184
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9184
spamassassin-spamd-command-execution(27008)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27008
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.