Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A flaw was discovered in the way that spamd processes the virtual POP
usernames passed to it. If running with the --vpopmail and --paranoid
flags, it is possible for a remote user with the ability to connect to
the spamd daemon to execute arbitrary commands as the user running
spamd.
By default, the Spamassassin packages do not start spamd with either
of these flags and this usage is uncommon.
The updated packages have been patched to correct this issue.
Updated Packages |
Corporate Server 3.0
e9880dac2293151fee552116c8e5a902 corporate/3.0/RPMS/perl-Mail-SpamAssassin-2.63-3.1.C30mdk.i586.rpm 4e170728b22d192b000815858b273eee corporate/3.0/RPMS/spamassassin-2.63-3.1.C30mdk.i586.rpm d521f709485d50b855c01498bafd2ee9 corporate/3.0/RPMS/spamassassin-tools-2.63-3.1.C30mdk.i586.rpm 9dd833ee9117769090e31737a3b5d3c0 corporate/3.0/SRPMS/spamassassin-2.63-3.1.C30mdk.src.rpm
Corporate Server 3.0/X86_64
522ceb2099aba82353b5d6c0b84e036b x86_64/corporate/3.0/RPMS/perl-Mail-SpamAssassin-2.63-3.1.C30mdk.x86_64.rpm fed7d62ada9999eb881cd91c97813b12 x86_64/corporate/3.0/RPMS/spamassassin-2.63-3.1.C30mdk.x86_64.rpm 6af7154dca6dde227556a29232c4936d x86_64/corporate/3.0/RPMS/spamassassin-tools-2.63-3.1.C30mdk.x86_64.rpm 9dd833ee9117769090e31737a3b5d3c0 x86_64/corporate/3.0/SRPMS/spamassassin-2.63-3.1.C30mdk.src.rpm
Mandriva Linux LE2005
46d652b5f05d2cfbae963971c24d78d4 10.2/RPMS/perl-Mail-SpamAssassin-3.0.4-0.3.102mdk.i586.rpm 44a1224bd226519db22aebb270c42483 10.2/RPMS/spamassassin-3.0.4-0.3.102mdk.i586.rpm 9f179cd3bfd20da13d362f5401852c6d 10.2/RPMS/spamassassin-spamc-3.0.4-0.3.102mdk.i586.rpm c60a25750b6ad0b230ae899d316e1541 10.2/RPMS/spamassassin-spamd-3.0.4-0.3.102mdk.i586.rpm e438cff191d2a2f476958e26db6dd73c 10.2/RPMS/spamassassin-tools-3.0.4-0.3.102mdk.i586.rpm 9f045bc37ba54f4f7cf96160c8263684 10.2/SRPMS/spamassassin-3.0.4-0.3.102mdk.src.rpm
Mandriva Linux LE2005/X86_64
10a7877e1f767e4362add79f63a4b59a x86_64/10.2/RPMS/perl-Mail-SpamAssassin-3.0.4-0.3.102mdk.x86_64.rpm 6758d4621bc87196c4f414671151f664 x86_64/10.2/RPMS/spamassassin-3.0.4-0.3.102mdk.x86_64.rpm d81349deafb0f75404bd0392aa0265c2 x86_64/10.2/RPMS/spamassassin-spamc-3.0.4-0.3.102mdk.x86_64.rpm 729c50b086cf1615ae0b93899ab13be2 x86_64/10.2/RPMS/spamassassin-spamd-3.0.4-0.3.102mdk.x86_64.rpm fc6093c2bebb9529a50a4387d08c9f12 x86_64/10.2/RPMS/spamassassin-tools-3.0.4-0.3.102mdk.x86_64.rpm 9f045bc37ba54f4f7cf96160c8263684 x86_64/10.2/SRPMS/spamassassin-3.0.4-0.3.102mdk.src.rpm
Mandriva Linux 2006
5f9c4967f7d5ee68f3685fb73c4f9c00 2006.0/RPMS/perl-Mail-SpamAssassin-3.0.4-3.3.20060mdk.i586.rpm 84d2d9fd675db96f575c0eabeec7f504 2006.0/RPMS/spamassassin-3.0.4-3.3.20060mdk.i586.rpm 4d138b95b964f971f2b7943f996e4fbc 2006.0/RPMS/spamassassin-spamc-3.0.4-3.3.20060mdk.i586.rpm aad1be80017b7532e55f713204e67246 2006.0/RPMS/spamassassin-spamd-3.0.4-3.3.20060mdk.i586.rpm 5e4a07050a994dd497de42abaf3755da 2006.0/RPMS/spamassassin-tools-3.0.4-3.3.20060mdk.i586.rpm 8fa7eb76024abfdca38fcdc567402a05 2006.0/SRPMS/spamassassin-3.0.4-3.3.20060mdk.src.rpm
Mandriva Linux 2006/X86_64
0f8ac90b7835c2668071a7cb5a0b2df0 x86_64/2006.0/RPMS/perl-Mail-SpamAssassin-3.0.4-3.3.20060mdk.x86_64.rpm 55d30c87ae9f1d4e7fc780227be56a7d x86_64/2006.0/RPMS/spamassassin-3.0.4-3.3.20060mdk.x86_64.rpm 8d4cdb3684ed973c7d2fa331293caf7f x86_64/2006.0/RPMS/spamassassin-spamc-3.0.4-3.3.20060mdk.x86_64.rpm 80a5662cbed250ae5a19b037eb394b79 x86_64/2006.0/RPMS/spamassassin-spamd-3.0.4-3.3.20060mdk.x86_64.rpm 40d6535486f0ac104864ad84df2c480e x86_64/2006.0/RPMS/spamassassin-tools-3.0.4-3.3.20060mdk.x86_64.rpm 8fa7eb76024abfdca38fcdc567402a05 x86_64/2006.0/SRPMS/spamassassin-3.0.4-3.3.20060mdk.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2447
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.