- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200506-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: SpamAssassin 3, Vipul's Razor: Denial of Service
            vulnerability
      Date: June 21, 2005
      Bugs: #94722, #95492
        ID: 200506-17

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=======
SpamAssassin and Vipul's Razor are vulnerable to a Denial of Service
attack when handling certain malformed messages.

Background
=========
SpamAssassin is an extensible email filter which is used to identify
junk email. Vipul's Razor is a client for a distributed, collaborative
spam detection and filtering network.

Affected packages
================
    -------------------------------------------------------------------
     Package                   /  Vulnerable  /             Unaffected
    -------------------------------------------------------------------
  1  mail-filter/spamassassin       < 3.0.4                   >= 3.0.4
                                                               < 3.0.1
  2  mail-filter/razor              < 2.71                     >= 2.71
    -------------------------------------------------------------------
     2 affected packages on all of their supported architectures.
    -------------------------------------------------------------------

Description
==========
SpamAssassin and Vipul's Razor contain a Denial of Service
vulnerability when handling special misformatted long message headers.

Impact
=====
By sending a specially crafted message an attacker could cause a Denial
of Service attack against the SpamAssassin/Vipul's Razor server.

Workaround
=========
There is no known workaround at this time.

Resolution
=========
All SpamAssassin users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=mail-filter/spamassassin-3.0.4"

All Vipul's Razor users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=mail-filter/razor-2.71"

References
=========
  [ 1 ] CAN-2005-1266
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1266
  [ 2 ] SpamAssassin Announcement
        https://lists.apache.org/thread/%3C17072.35054.586017.822288@proton.pathname.com%3E
  [ 3 ] Vipul's Razor Announcement
        ;forum_id=4259

Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  https://security.gentoo.org/glsa/200506-17

Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org/.

License
======
Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.0/

Gentoo: GLSA-200506-17: SpamAssassin 3, Vipul's Razor: Denial of Service vulnerability

SpamAssassin and Vipul's Razor are vulnerable to a Denial of Service attack when handling certain malformed messages.

Summary

Gentoo Linux Security Advisory GLSA 200506-17 https://security.gentoo.org/ Severity: Normal Title: SpamAssassin 3, Vipul's Razor: Denial of Service vulnerability Date: June 21, 2005 Bugs: #94722, #95492 ID: 200506-17

Synopsis ======= SpamAssassin and Vipul's Razor are vulnerable to a Denial of Service attack when handling certain malformed messages.
Background ========= SpamAssassin is an extensible email filter which is used to identify junk email. Vipul's Razor is a client for a distributed, collaborative spam detection and filtering network.
Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 mail-filter/spamassassin < 3.0.4 >= 3.0.4 < 3.0.1 2 mail-filter/razor < 2.71 >= 2.71 ------------------------------------------------------------------- 2 affected packages on all of their supported architectures. -------------------------------------------------------------------
========== SpamAssassin and Vipul's Razor contain a Denial of Service vulnerability when handling special misformatted long message headers.
Impact ===== By sending a specially crafted message an attacker could cause a Denial of Service attack against the SpamAssassin/Vipul's Razor server.
Workaround ========= There is no known workaround at this time.
Resolution ========= All SpamAssassin users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-filter/spamassassin-3.0.4"
All Vipul's Razor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-filter/razor-2.71"
References ========= [ 1 ] CAN-2005-1266 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1266 [ 2 ] SpamAssassin Announcement https://lists.apache.org/thread/%3C17072.35054.586017.822288@proton.pathname.com%3E [ 3 ] Vipul's Razor Announcement ;forum_id=4259
Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/200506-17
Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org/.
License ====== Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.0/

Resolution

References

Availability

Concerns

Severity

Synopsis

Background

Affected Packages

Impact

Workaround

Related News