Amazon Linux AMI : spamassassin (ALAS-2020-1341)

medium Nessus Plugin ID 133560

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.
(CVE-2019-12420)

In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA 3.4.3, we recommend that users should only use update channels or 3rd party .cf files from trusted places.
(CVE-2018-11805)

Solution

Run 'yum update spamassassin' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2020-1341.html

Plugin Details

Severity: Medium

ID: 133560

File Name: ala_ALAS-2020-1341.nasl

Version: 1.2

Type: local

Agent: unix

Published: 2/10/2020

Updated: 2/12/2020

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2018-11805

CVSS v3

Risk Factor: Medium

Base Score: 6.7

Temporal Score: 5.8

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:spamassassin, p-cpe:/a:amazon:linux:spamassassin-debuginfo, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 2/7/2020

Vulnerability Publication Date: 12/12/2019

Reference Information

CVE: CVE-2018-11805, CVE-2019-12420

ALAS: 2020-1341