Description
In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf) files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA version 3.4.5, users should only use update channels or 3rd party .cf files from trusted places.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2615-1 | spamassassin security update |
Debian DSA |
DSA-4879-1 | spamassassin security update |
EUVD |
EUVD-2020-12752 | In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf) files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA version 3.4.5, users should only use update channels or 3rd party .cf files from trusted places. |
Ubuntu USN |
USN-4899-1 | SpamAssassin vulnerability |
Ubuntu USN |
USN-4899-2 | SpamAssassin vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T16:27:40.012Z
Reserved: 2019-12-02T00:00:00.000Z
Link: CVE-2020-1946
No data.
Status : Modified
Published: 2021-03-25T10:15:11.727
Modified: 2024-11-21T05:11:42.607
Link: CVE-2020-1946
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN