Home > Security > Advisories

Advisories

Mandriva Advisories

Package name spamassassin
Date June 14th, 2006
Advisory ID MDKSA-2006:103
Affected versions CS3.0, 10.2, 2006.0
Synopsis Updated spamassassin packages fix vulnerability

Problem Description

A flaw was discovered in the way that spamd processes the virtual POP
usernames passed to it. If running with the --vpopmail and --paranoid
flags, it is possible for a remote user with the ability to connect to
the spamd daemon to execute arbitrary commands as the user running
spamd.

By default, the Spamassassin packages do not start spamd with either
of these flags and this usage is uncommon.

The updated packages have been patched to correct this issue.

Updated Packages

Corporate Server 3.0

 e9880dac2293151fee552116c8e5a902  corporate/3.0/RPMS/perl-Mail-SpamAssassin-2.63-3.1.C30mdk.i586.rpm
 4e170728b22d192b000815858b273eee  corporate/3.0/RPMS/spamassassin-2.63-3.1.C30mdk.i586.rpm
 d521f709485d50b855c01498bafd2ee9  corporate/3.0/RPMS/spamassassin-tools-2.63-3.1.C30mdk.i586.rpm
 9dd833ee9117769090e31737a3b5d3c0  corporate/3.0/SRPMS/spamassassin-2.63-3.1.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 522ceb2099aba82353b5d6c0b84e036b  x86_64/corporate/3.0/RPMS/perl-Mail-SpamAssassin-2.63-3.1.C30mdk.x86_64.rpm
 fed7d62ada9999eb881cd91c97813b12  x86_64/corporate/3.0/RPMS/spamassassin-2.63-3.1.C30mdk.x86_64.rpm
 6af7154dca6dde227556a29232c4936d  x86_64/corporate/3.0/RPMS/spamassassin-tools-2.63-3.1.C30mdk.x86_64.rpm
 9dd833ee9117769090e31737a3b5d3c0  x86_64/corporate/3.0/SRPMS/spamassassin-2.63-3.1.C30mdk.src.rpm

Mandriva Linux LE2005

 46d652b5f05d2cfbae963971c24d78d4  10.2/RPMS/perl-Mail-SpamAssassin-3.0.4-0.3.102mdk.i586.rpm
 44a1224bd226519db22aebb270c42483  10.2/RPMS/spamassassin-3.0.4-0.3.102mdk.i586.rpm
 9f179cd3bfd20da13d362f5401852c6d  10.2/RPMS/spamassassin-spamc-3.0.4-0.3.102mdk.i586.rpm
 c60a25750b6ad0b230ae899d316e1541  10.2/RPMS/spamassassin-spamd-3.0.4-0.3.102mdk.i586.rpm
 e438cff191d2a2f476958e26db6dd73c  10.2/RPMS/spamassassin-tools-3.0.4-0.3.102mdk.i586.rpm
 9f045bc37ba54f4f7cf96160c8263684  10.2/SRPMS/spamassassin-3.0.4-0.3.102mdk.src.rpm

Mandriva Linux LE2005/X86_64

 10a7877e1f767e4362add79f63a4b59a  x86_64/10.2/RPMS/perl-Mail-SpamAssassin-3.0.4-0.3.102mdk.x86_64.rpm
 6758d4621bc87196c4f414671151f664  x86_64/10.2/RPMS/spamassassin-3.0.4-0.3.102mdk.x86_64.rpm
 d81349deafb0f75404bd0392aa0265c2  x86_64/10.2/RPMS/spamassassin-spamc-3.0.4-0.3.102mdk.x86_64.rpm
 729c50b086cf1615ae0b93899ab13be2  x86_64/10.2/RPMS/spamassassin-spamd-3.0.4-0.3.102mdk.x86_64.rpm
 fc6093c2bebb9529a50a4387d08c9f12  x86_64/10.2/RPMS/spamassassin-tools-3.0.4-0.3.102mdk.x86_64.rpm
 9f045bc37ba54f4f7cf96160c8263684  x86_64/10.2/SRPMS/spamassassin-3.0.4-0.3.102mdk.src.rpm

Mandriva Linux 2006

 5f9c4967f7d5ee68f3685fb73c4f9c00  2006.0/RPMS/perl-Mail-SpamAssassin-3.0.4-3.3.20060mdk.i586.rpm
 84d2d9fd675db96f575c0eabeec7f504  2006.0/RPMS/spamassassin-3.0.4-3.3.20060mdk.i586.rpm
 4d138b95b964f971f2b7943f996e4fbc  2006.0/RPMS/spamassassin-spamc-3.0.4-3.3.20060mdk.i586.rpm
 aad1be80017b7532e55f713204e67246  2006.0/RPMS/spamassassin-spamd-3.0.4-3.3.20060mdk.i586.rpm
 5e4a07050a994dd497de42abaf3755da  2006.0/RPMS/spamassassin-tools-3.0.4-3.3.20060mdk.i586.rpm
 8fa7eb76024abfdca38fcdc567402a05  2006.0/SRPMS/spamassassin-3.0.4-3.3.20060mdk.src.rpm

Mandriva Linux 2006/X86_64

 0f8ac90b7835c2668071a7cb5a0b2df0  x86_64/2006.0/RPMS/perl-Mail-SpamAssassin-3.0.4-3.3.20060mdk.x86_64.rpm
 55d30c87ae9f1d4e7fc780227be56a7d  x86_64/2006.0/RPMS/spamassassin-3.0.4-3.3.20060mdk.x86_64.rpm
 8d4cdb3684ed973c7d2fa331293caf7f  x86_64/2006.0/RPMS/spamassassin-spamc-3.0.4-3.3.20060mdk.x86_64.rpm
 80a5662cbed250ae5a19b037eb394b79  x86_64/2006.0/RPMS/spamassassin-spamd-3.0.4-3.3.20060mdk.x86_64.rpm
 40d6535486f0ac104864ad84df2c480e  x86_64/2006.0/RPMS/spamassassin-tools-3.0.4-3.3.20060mdk.x86_64.rpm
 8fa7eb76024abfdca38fcdc567402a05  x86_64/2006.0/SRPMS/spamassassin-3.0.4-3.3.20060mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2447

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.