In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA 3.4.3, we recommend that users should only use update channels or 3rd party .cf files from trusted places.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2037-1 | spamassassin security update |
Debian DLA |
DLA-2062-1 | sa-exim security update |
Debian DSA |
DSA-4584-1 | spamassassin security update |
EUVD |
EUVD-2018-3797 | In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA 3.4.3, we recommend that users should only use update channels or 3rd party .cf files from trusted places. |
Ubuntu USN |
USN-4237-1 | SpamAssassin vulnerabilities |
Ubuntu USN |
USN-4237-2 | SpamAssassin vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-05T08:17:09.279Z
Reserved: 2018-06-05T00:00:00
Link: CVE-2018-11805
No data.
Status : Modified
Published: 2019-12-12T23:15:11.947
Modified: 2024-11-21T03:44:04.220
Link: CVE-2018-11805
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN