Debian: DSA-2021-1: New spamass-milter packages fix remote command

    Date22 Mar 2010
    CategoryDebian
    53
    Posted ByLinuxSecurity Advisories
    It was discovered a missing input sanitization in spamass-milter, a milter used to filter mail through spamassassin. This allows a remote attacker to inject and execute arbitrary shell commands.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-2021-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                        Giuseppe Iuculano
    March 22, 2010                        http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : spamass-milter
    Vulnerability  : missing input sanitization
    Problem-Type   : remote
    Debian-specific: no
    CVE Id(s)      : none assigned yet
    Debian Bug     : 573228
    
    It was discovered a missing input sanitization in spamass-milter, a milter
    used to filter mail through spamassassin.
    This allows a remote attacker to inject and execute arbitrary shell commands.
    
    For the stable distribution (lenny), this problem has been fixed in
    version 0.3.1-8+lenny1.
    
    For the testing (squeeze) and unstable (sid) distribution this problem
    has been fixed in version 0.3.1-9.
    
    We recommend that you upgrade your spamass-milter package.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian (stable)
    - ---------------
    
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1.orig.tar.gz
        Size/MD5 checksum:   141144 ca6bf6a9c88db74a6bfea41f499c0ba6
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1.dsc
        Size/MD5 checksum:     1050 bb733b6a573d78be8a64002dbc592d44
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1.diff.gz
        Size/MD5 checksum:    35298 c67ac575ec83da156f19d90a21c400e2
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_alpha.deb
        Size/MD5 checksum:    54606 a623cc750ad2dbeabb4ec9cc238bc40b
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_amd64.deb
        Size/MD5 checksum:    52752 8f67c0d4ebeb820a0a80b7c8a20a1761
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_arm.deb
        Size/MD5 checksum:    51254 87c4345b656711abf391b2c1620f0fa7
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_armel.deb
        Size/MD5 checksum:    47902 98855e92d23f6f2665f000a88a163dba
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_hppa.deb
        Size/MD5 checksum:    55546 6c97177505594b5389fdfe30cd293d80
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_i386.deb
        Size/MD5 checksum:    50980 109a06776578187d95ae70c3734e6b6d
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_ia64.deb
        Size/MD5 checksum:    59414 c816e86e810a4d611636bfec6a9df1cc
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_mipsel.deb
        Size/MD5 checksum:    51306 7204015ca8e050ccf6ea81626e215dbf
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_powerpc.deb
        Size/MD5 checksum:    55604 039127c2ba41f85b8c5a9c2c0889014b
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_s390.deb
        Size/MD5 checksum:    51450 f324ff3a60af459f5d15b8efc9e6e891
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_sparc.deb
        Size/MD5 checksum:    50052 1ca672e1eeb9a58376c09c61d4f00977
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":62.5,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.