Executive Summary
Summary | |
---|---|
Title | New spamassassin packages fix potential DOS |
Informations | |||
---|---|---|---|
Name | DSA-736 | First vendor Publication | 2005-07-01 |
Vendor | Debian | Last vendor Modification | 2005-07-07 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability was recently found in the way that SpamAssassin parses certain email headers. This vulnerability could cause SpamAssassin to consume a large number of CPU cycles when processing messages containing these headers, leading to a potential denial of service (DOS) attack. The version of SpamAssassin in the old stable distribution (woody) is not vulnerable. For the stable distribution (sarge), this problem has been fixed in version 3.0.3-2. Note that packages are not yet ready for certain architectures; these will be released as they become available. For the unstable distribution (sid), this problem has been fixed in version 3.0.4-1. The only change since DSA 736-1 is the addition of packages for certain architectures that were not available at the time of the original advisory. We recommend that you upgrade your sarge or sid spamassassin package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-736 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10901 | |||
Oval ID: | oval:org.mitre.oval:def:10901 | ||
Title: | Apache SpamAssassin 3.0.1, 3.0.2, and 3.0.3 allows remote attackers to cause a denial of service (CPU consumption and slowdown) via a message with a long Content-Type header without any boundaries. | ||
Description: | Apache SpamAssassin 3.0.1, 3.0.2, and 3.0.3 allows remote attackers to cause a denial of service (CPU consumption and slowdown) via a message with a long Content-Type header without any boundaries. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-1266 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 |
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200506-17 (SpamAssassin, Vipul's Razor) File : nvt/glsa_200506_17.nasl |
2008-09-04 | Name : FreeBSD Ports: p5-Mail-SpamAssassin File : nvt/freebsd_p5-Mail-SpamAssassin0.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 736-1 (spamassassin) File : nvt/deb_736_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
17346 | SpamAssassin Message Header Processing Overflow DoS |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | SpamAssassin malformed email header DoS attempt RuleID : 15954 - Revision : 11 - Type : SERVER-MAIL |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-01-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-773.nasl - Type : ACT_GATHER_INFO |
2006-07-05 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2005-498.nasl - Type : ACT_GATHER_INFO |
2005-07-20 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2005_033.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_cc4ce06be01c11d9a8bd000cf18bbe54.nasl - Type : ACT_GATHER_INFO |
2005-07-01 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-736.nasl - Type : ACT_GATHER_INFO |
2005-06-28 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2005-106.nasl - Type : ACT_GATHER_INFO |
2005-06-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-498.nasl - Type : ACT_GATHER_INFO |
2005-06-21 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200506-17.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:05 |
|