Mandrake Linux Security Advisory : spamassassin (MDKSA-2006:103)

medium Nessus Plugin ID 21718

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

A flaw was discovered in the way that spamd processes the virtual POP usernames passed to it. If running with the --vpopmail and --paranoid flags, it is possible for a remote user with the ability to connect to the spamd daemon to execute arbitrary commands as the user running spamd.

By default, the Spamassassin packages do not start spamd with either of these flags and this usage is uncommon.

The updated packages have been patched to correct this issue.

Solution

Update the affected packages.

Plugin Details

Severity: Medium

ID: 21718

File Name: mandrake_MDKSA-2006-103.nasl

Version: 1.17

Type: local

Published: 6/16/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.8

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:perl-mail-spamassassin, p-cpe:/a:mandriva:linux:spamassassin, p-cpe:/a:mandriva:linux:spamassassin-spamc, p-cpe:/a:mandriva:linux:spamassassin-spamd, p-cpe:/a:mandriva:linux:spamassassin-tools, cpe:/o:mandriva:linux:2006, x-cpe:/o:mandrakesoft:mandrake_linux:le2005

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/14/2006

Exploitable With

Metasploit (SpamAssassin spamd Remote Command Execution)

Reference Information

CVE: CVE-2006-2447

MDKSA: 2006:103