Summary
The remote host is missing an update to spamassassin announced via advisory DSA 1090-1.
A vulnerability has been discoverd in SpamAssassin, a Perl-based spam filter using text analysis, that can allow remote attackers to execute arbitrary commands. This problem only affects systems where spamd is reachable via the internet and used with vpopmail virtual users, via the -v / --vpopmail switch, and with the -P / --paranoid switch which is not the default setting on Debian.
The old stable distribution (woody) is not affected by this problem.
Solution
For the stable distribution (sarge) this problem has been fixed in version 3.0.3-2sarge1.
For the volatile archive for the stable distribution (sarge) this problem has been fixed in version 3.1.0a-0volatile3.
For the unstable distribution (sid) this problem has been fixed in version 3.1.3-1.
We recommend that you upgrade your spamd package.
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201090-1
Severity
Classification
-
CVE CVE-2006-2447 -
CVSS Base Score: 5.1
AV:N/AC:H/Au:N/C:P/I:P/A:P
Related Vulnerabilities