Mandrake Linux Security Advisory : spamassassin (MDKSA-2006:103)

Medium Nessus Plugin ID 21718


The remote Mandrake Linux host is missing one or more security updates.


A flaw was discovered in the way that spamd processes the virtual POP usernames passed to it. If running with the --vpopmail and --paranoid flags, it is possible for a remote user with the ability to connect to the spamd daemon to execute arbitrary commands as the user running spamd.

By default, the Spamassassin packages do not start spamd with either of these flags and this usage is uncommon.

The updated packages have been patched to correct this issue.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 21718

File Name: mandrake_MDKSA-2006-103.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2006/06/16

Modified: 2013/05/31

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:perl-Mail-SpamAssassin, p-cpe:/a:mandriva:linux:spamassassin, p-cpe:/a:mandriva:linux:spamassassin-spamc, p-cpe:/a:mandriva:linux:spamassassin-spamd, p-cpe:/a:mandriva:linux:spamassassin-tools, cpe:/o:mandriva:linux:2006, x-cpe:/o:mandrakesoft:mandrake_linux:le2005

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2006/06/14

Exploitable With

Metasploit (SpamAssassin spamd Remote Command Execution)

Reference Information

CVE: CVE-2006-2447

MDKSA: 2006:103