CentOS 4 : spamassassin (CESA-2006:0543)

medium Nessus Plugin ID 21999

Synopsis

The remote CentOS host is missing a security update.

Description

Updated spamassassin packages that fix an arbitrary code execution flaw are now available.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

SpamAssassin provides a way to reduce unsolicited commercial email (SPAM) from incoming email.

A flaw was found with the way the Spamassassin spamd daemon processes the virtual pop username passed to it. If a site is running spamd with both the --vpopmail and --paranoid flags, it is possible for a remote user with the ability to connect to the spamd daemon to execute arbitrary commands as the user running the spamd daemon.
(CVE-2006-2447)

Note: None of the IMAP or POP servers shipped with Red Hat Enterprise Linux 4 support vpopmail delivery. Running spamd with the --vpopmail and --paranoid flags is uncommon and not the default startup option as shipped with Red Hat Enterprise Linux 4.

Spamassassin, as shipped in Red Hat Enterprise Linux 4, performs RBL lookups against visi.com to help determine if an email is spam.
However, this DNS RBL has recently disappeared, resulting in mail filtering delays and timeouts.

Users of SpamAssassin should upgrade to these updated packages containing version 3.0.6 and backported patches, which are not vulnerable to these issues.

Solution

Update the affected spamassassin package.

See Also

http://www.nessus.org/u?0d64d841

http://www.nessus.org/u?de05ffd1

http://www.nessus.org/u?29856dfe

Plugin Details

Severity: Medium

ID: 21999

File Name: centos_RHSA-2006-0543.nasl

Version: 1.20

Type: local

Agent: unix

Published: 7/5/2006

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.8

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:centos:centos:spamassassin, cpe:/o:centos:centos:4

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/7/2006

Vulnerability Publication Date: 6/6/2006

Exploitable With

Metasploit (SpamAssassin spamd Remote Command Execution)

Reference Information

CVE: CVE-2006-2447

RHSA: 2006:0543