![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.59688 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 7 FEDORA-2007-0390 (spamassassin) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to spamassassin announced via advisory FEDORA-2007-0390. SpamAssassin provides you with a way to reduce if not completely eliminate Unsolicited Commercial Email (SPAM) from your incoming email. It can be invoked by a MDA such as sendmail or postfix, or can be called from a procmail script, .forward file, etc. It uses a genetic-algorithm evolved scoring system to identify messages which look spammy, then adds headers to the message so they can be filtered by the user's mail reading software. This distribution includes the spamd/spamc components which create a server that considerably speeds processing of mail. To enable spamassassin, if you are receiving mail locally, simply add this line to your ~ /.procmailrc: INCLUDERC=/etc/mail/spamassassin/spamassassin-default.rc To filter spam for all users, add that line to /etc/procmailrc (creating if necessary). Update Information: Local symlink vulnerability. Fedora is not vulnerable in any default or common configurations. Read upstream's announcement for details. http://spamassassin.apache.org/advisories/cve-2007-2873.txt ChangeLog: * Mon Jun 11 2007 Warren Togami 3.2.1-1 - 3.2.1 CVE-2007-2873 References: [ 1 ] CVE-2007-2873 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2873 Updated packages: 8ff93dacf15b6b87c5671ed14b2c3ebc6d635e78 spamassassin-3.2.1-1.fc7.ppc64.rpm b4e358f30ffe83679f93da8308f1f9d0d4cd5577 spamassassin-debuginfo-3.2.1-1.fc7.ppc64.rpm 9b5ebf66aeeffb680d353af9969f615d3f499216 spamassassin-3.2.1-1.fc7.i386.rpm 4e0bb96880e3e68ef9dc69b598271c371fc69d48 spamassassin-debuginfo-3.2.1-1.fc7.i386.rpm 42637e0bc1aa5e49271659aca910b4c90adba729 spamassassin-3.2.1-1.fc7.x86_64.rpm 7b216cc7e17d28fca9e21eaf714576c124ab6a3a spamassassin-debuginfo-3.2.1-1.fc7.x86_64.rpm e89a9dd4e07a3f0d110745e2ac0f847d452fb392 spamassassin-3.2.1-1.fc7.ppc.rpm 762d0ea08671e47207baeadb60c8da771181f456 spamassassin-debuginfo-3.2.1-1.fc7.ppc.rpm 4be2f1bd5f8e626f743af081a271e728b0aa2463 spamassassin-3.2.1-1.fc7.src.rpm This update can be installed with the 'yum' update program. Use 'yum update package-name' at the command line. For more information, refer to 'Managing Software with yum,' available at http://docs.fedoraproject.org/yum/. Solution: Apply the appropriate updates. http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-0390 Risk factor : Low CVSS Score: 1.9 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-2873 1018242 http://www.securitytracker.com/id?1018242 24481 http://www.securityfocus.com/bid/24481 37234 http://osvdb.org/37234 ADV-2007-2172 http://www.vupen.com/english/advisories/2007/2172 MDKSA-2007:125 http://www.mandriva.com/security/advisories?name=MDKSA-2007:125 RHSA-2007:0492 http://www.redhat.com/support/errata/RHSA-2007-0492.html http://spamassassin.apache.org/advisories/cve-2007-2873.txt https://issues.rpath.com/browse/RPL-1450 oval:org.mitre.oval:def:10354 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10354 spamassassin-symlink-dos(34864) https://exchange.xforce.ibmcloud.com/vulnerabilities/34864 |
Copyright | Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |