Lucene search

K
freebsdFreeBSDC86BFEE3-4441-11EA-8BE3-54E1AD3D6335
HistoryJan 28, 2020 - 12:00 a.m.

spamassassin -- Nefarious rule configuration files can run system commands

2020-01-2800:00:00
vuxml.freebsd.org
12

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.009 Low

EPSS

Percentile

82.2%

The Apache SpamAssassin project reports:

A nefarious rule configuration (.cf) files can be configured to
run system commands. This issue is less stealthy and attempts to
exploit the issue will throw warnings.
Thanks to Damian Lukowski at credativ for reporting the issue
ethically. With this bug unpatched, exploits can be injected in a
number of scenarios though doing so remotely is difficult. In
addition to upgrading to SA 3.4.4, we again recommend that users
should only use update channels or 3rd party .cf files from trusted
places.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchspamassassin< 3.4.4UNKNOWN

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.009 Low

EPSS

Percentile

82.2%