Executive Summary
Summary | |
---|---|
Title | bogofilter vulnerability |
Informations | |||
---|---|---|---|
Name | USN-26-1 | First vendor Publication | 2004-11-17 |
Vendor | Ubuntu | Last vendor Modification | 2004-11-17 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) The following packages are affected: bogofilter The problem can be corrected by upgrading the affected package to version 0.92.0-1ubuntu0.1. In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Antti-Juhani Kaijanaho discovered a Denial of Service vulnerability in bogofilter. The quoted-printable decoder handled certain Base-64 encoded strings in an invalid way which caused a buffer overflow and an immediate program abort. The exact impact depends on the way bogofilter is integrated into the system. In common setups, the mail that contains such malformed headers is deferred by the mail delivery agent and remains in the queue, where it will eventually bounce back to the sender. |
Original Source
Url : http://www.ubuntu.com/usn/USN-26-1 |
Alert History
Date | Informations |
---|---|
2016-04-26 13:54:17 |
|
2014-02-17 12:03:20 |
|
2013-05-11 12:25:22 |
|