Description
In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA 3.4.3, we recommend that users should only use update channels or 3rd party .cf files from trusted places.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2037-1 | spamassassin security update |
Debian DLA |
DLA-2062-1 | sa-exim security update |
Debian DSA |
DSA-4584-1 | spamassassin security update |
EUVD |
EUVD-2018-3797 | In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA 3.4.3, we recommend that users should only use update channels or 3rd party .cf files from trusted places. |
Ubuntu USN |
USN-4237-1 | SpamAssassin vulnerabilities |
Ubuntu USN |
USN-4237-2 | SpamAssassin vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-05T08:17:09.279Z
Reserved: 2018-06-05T00:00:00.000Z
Link: CVE-2018-11805
No data.
Status : Modified
Published: 2019-12-12T23:15:11.947
Modified: 2024-11-21T03:44:04.220
Link: CVE-2018-11805
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN