In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf) files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA version 3.4.5, users should only use update channels or 3rd party .cf files from trusted places.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2615-1 | spamassassin security update |
![]() |
DSA-4879-1 | spamassassin security update |
![]() |
EUVD-2020-12752 | In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf) files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA version 3.4.5, users should only use update channels or 3rd party .cf files from trusted places. |
![]() |
USN-4899-1 | SpamAssassin vulnerability |
![]() |
USN-4899-2 | SpamAssassin vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T16:27:40.012Z
Reserved: 2019-12-02T00:00:00.000Z
Link: CVE-2020-1946

No data.

Status : Modified
Published: 2021-03-25T10:15:11.727
Modified: 2024-11-21T05:11:42.607
Link: CVE-2020-1946


No data.