Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59688
Category:Fedora Local Security Checks
Title:Fedora Core 7 FEDORA-2007-0390 (spamassassin)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to spamassassin
announced via advisory FEDORA-2007-0390.

SpamAssassin provides you with a way to reduce if not completely eliminate
Unsolicited Commercial Email (SPAM) from your incoming email. It can
be invoked by a MDA such as sendmail or postfix, or can be called from
a procmail script, .forward file, etc. It uses a genetic-algorithm
evolved scoring system to identify messages which look spammy, then
adds headers to the message so they can be filtered by the user's mail
reading software. This distribution includes the spamd/spamc components
which create a server that considerably speeds processing of mail.

To enable spamassassin, if you are receiving mail locally, simply add
this line to your ~
/.procmailrc:
INCLUDERC=/etc/mail/spamassassin/spamassassin-default.rc

To filter spam for all users, add that line to /etc/procmailrc
(creating if necessary).

Update Information:

Local symlink vulnerability. Fedora is not vulnerable in any default or common configurations. Read upstream's announcement for details.

http://spamassassin.apache.org/advisories/cve-2007-2873.txt
ChangeLog:

* Mon Jun 11 2007 Warren Togami 3.2.1-1
- 3.2.1 CVE-2007-2873
References:

[ 1 ] CVE-2007-2873
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2873
Updated packages:

8ff93dacf15b6b87c5671ed14b2c3ebc6d635e78 spamassassin-3.2.1-1.fc7.ppc64.rpm
b4e358f30ffe83679f93da8308f1f9d0d4cd5577 spamassassin-debuginfo-3.2.1-1.fc7.ppc64.rpm
9b5ebf66aeeffb680d353af9969f615d3f499216 spamassassin-3.2.1-1.fc7.i386.rpm
4e0bb96880e3e68ef9dc69b598271c371fc69d48 spamassassin-debuginfo-3.2.1-1.fc7.i386.rpm
42637e0bc1aa5e49271659aca910b4c90adba729 spamassassin-3.2.1-1.fc7.x86_64.rpm
7b216cc7e17d28fca9e21eaf714576c124ab6a3a spamassassin-debuginfo-3.2.1-1.fc7.x86_64.rpm
e89a9dd4e07a3f0d110745e2ac0f847d452fb392 spamassassin-3.2.1-1.fc7.ppc.rpm
762d0ea08671e47207baeadb60c8da771181f456 spamassassin-debuginfo-3.2.1-1.fc7.ppc.rpm
4be2f1bd5f8e626f743af081a271e728b0aa2463 spamassassin-3.2.1-1.fc7.src.rpm

This update can be installed with the 'yum' update program. Use 'yum update
package-name' at the command line. For more information, refer to 'Managing
Software with yum,' available at http://docs.fedoraproject.org/yum/.

Solution: Apply the appropriate updates.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-0390

Risk factor : Low

CVSS Score:
1.9

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-2873
1018242
http://www.securitytracker.com/id?1018242
24481
http://www.securityfocus.com/bid/24481
37234
http://osvdb.org/37234
ADV-2007-2172
http://www.vupen.com/english/advisories/2007/2172
MDKSA-2007:125
http://www.mandriva.com/security/advisories?name=MDKSA-2007:125
RHSA-2007:0492
http://www.redhat.com/support/errata/RHSA-2007-0492.html
http://spamassassin.apache.org/advisories/cve-2007-2873.txt
https://issues.rpath.com/browse/RPL-1450
oval:org.mitre.oval:def:10354
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10354
spamassassin-symlink-dos(34864)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34864
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.