Vulnerability Bulletins |
Ejecución de comandos arbitrarios en SpamAssassin Milter |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Obtener acceso |
Dificulty | Principiante |
Required attacker level | Acceso remoto sin cuenta a un servicio estandar |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | SpamAssassin Milter plugin 0.3.1 |
Description |
|
Se ha descubierto una vulnerabilidad en el plugin SpamAssassin Milter 0.3.1. La vulnerabilidad reside en un error en la función "mlfi_envrcpt" en "spamass-milter.cpp" cuando se usa la opción "expand". Un atacante remoto podría ejecutar comandos arbitrarios mediante caracteres de una consola shell especiales en el campo "RCPT TO" de un correo electrónico. Exploit público disponible. |
|
Solution |
|
Actualización de software Debian (DSA-2021-1) Debian Linux 5.0 Source http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1.orig.tar.gz http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2.dsc http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2.diff.gz alpha (DEC Alpha) http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_alpha.deb amd64 (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_amd64.deb arm (ARM) http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_arm.deb armel (ARM EABI) http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_armel.deb hppa (HP PA RISC) http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_hppa.deb i386 (Intel ia32) http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_i386.deb ia64 (Intel ia64) http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_ia64.deb mips (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_mips.deb powerpc (PowerPC) http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_powerpc.deb s390 (IBM S/390) http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_s390.deb sparc (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_sparc.deb |
|
Standar resources |
|
Property | Value |
CVE | CVE-2010-1132 |
BID | 38578 |
Other resources |
|
Debian Security Advisory (DSA-2021-1) http://lists.debian.org/debian-security-announce/2010/msg00080.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2010-05-05 |