[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2018-1091 --- spamassassin

ID: oval:org.secpod.oval:def:1600937Date: (C)2018-10-23   (M)2023-11-10
Class: PATCHFamily: unix




A flaw was found in the way a local user on the SpamAssassin server could inject code in the meta rule syntax. This could cause the arbitrary code execution on the server when these rules are being processed.A potential Remote Code Execution bug exists with the PDFInfo plugin in Apache SpamAssassin before 3.4.2.A flaw was found in the way SpamAssassin processes HTML email containing unclosed HTML tags. A carefully crafted mail message could cause SpamAssassin to consume significant resources. If a large number of these messages are sent, a denial of service could occur potentially delaying or preventing the delivery of email.

Platform:
Amazon Linux AMI
Product:
spamassassin
Reference:
ALAS-2018-1091
CVE-2017-15705
CVE-2018-11780
CVE-2018-11781
CVE    3
CVE-2017-15705
CVE-2018-11780
CVE-2018-11781
CPE    2
cpe:/o:amazon:linux
cpe:/a:apache:spamassassin

© SecPod Technologies