MGASA-2019-0406 - Updated spamassassin packages fix security vulnerabilities

Publication date: 24 Dec 2019
URL: https://advisories.mageia.org/MGASA-2019-0406.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2018-11805,
     CVE-2019-12420

The updated packages fix security vulnerabilities:

In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured
to run system commands without any output or errors. With this, exploits
can be injected in a number of scenarios. In addition to upgrading to SA
3.4.3, we recommend that users should only use update channels or 3rdparty
.cf files from trusted places. (CVE-2018-11805)

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to
use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the
recommended fix but details will not be shared publicly. (CVE-2019-12420)

References:
- https://bugs.mageia.org/show_bug.cgi?id=25860
- https://www.openwall.com/lists/oss-security/2019/12/12/1
- https://www.openwall.com/lists/oss-security/2019/12/12/2
- https://svn.apache.org/repos/asf/spamassassin/branches/3.4/build/announcements/3.4.3.txt
- https://www.debian.org/security/2019/dsa-4584
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11805
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12420

SRPMS:
- 7/core/spamassassin-3.4.3-1.mga7
- 7/core/spamassassin-rules-3.4.3-1.mga7

Mageia 2019-0406: spamassassin security update

The updated packages fix security vulnerabilities: In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors

Summary

The updated packages fix security vulnerabilities:
In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA 3.4.3, we recommend that users should only use update channels or 3rdparty .cf files from trusted places. (CVE-2018-11805)
In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly. (CVE-2019-12420)

References

- https://bugs.mageia.org/show_bug.cgi?id=25860

- https://www.openwall.com/lists/oss-security/2019/12/12/1

- https://www.openwall.com/lists/oss-security/2019/12/12/2

- https://svn.apache.org/repos/asf/spamassassin/branches/3.4/build/announcements/3.4.3.txt

- https://www.debian.org/security/2019/dsa-4584

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11805

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12420

Resolution

MGASA-2019-0406 - Updated spamassassin packages fix security vulnerabilities

SRPMS

- 7/core/spamassassin-3.4.3-1.mga7

- 7/core/spamassassin-rules-3.4.3-1.mga7

Severity
Publication date: 24 Dec 2019
URL: https://advisories.mageia.org/MGASA-2019-0406.html
Type: security
CVE: CVE-2018-11805, CVE-2019-12420

Related News