Mandrake Linux Security Advisory : spamassassin (MDKSA-2005:221)

Medium Nessus Plugin ID 20452


The remote Mandrake Linux host is missing one or more security updates.


SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients ('To' addresses), which triggers a bus error in Perl.

Updated packages have been patched to address this issue.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 20452

File Name: mandrake_MDKSA-2005-221.nasl

Version: $Revision: 1.13 $

Type: local

Published: 2006/01/15

Modified: 2013/05/31

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:perl-Mail-SpamAssassin, p-cpe:/a:mandriva:linux:spamassassin, p-cpe:/a:mandriva:linux:spamassassin-spamc, p-cpe:/a:mandriva:linux:spamassassin-spamd, p-cpe:/a:mandriva:linux:spamassassin-tools, cpe:/o:mandrakesoft:mandrake_linux:10.1, cpe:/o:mandriva:linux:2006, x-cpe:/o:mandrakesoft:mandrake_linux:le2005

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2005/12/02

Reference Information

CVE: CVE-2005-3351

MDKSA: 2005:221