Skip to navigation

Security Advisory spamassassin security update

Advisory: RHSA-2006:0543-10
Type: Security Advisory
Severity: Moderate
Issued on: 2006-06-06
Last updated on: 2006-06-06
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2006-2447

Details

Updated spamassassin packages that fix an arbitrary code execution flaw
are now available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

SpamAssassin provides a way to reduce unsolicited commercial email (SPAM)
from incoming email.

A flaw was found with the way the Spamassassin spamd daemon processes the
virtual pop username passed to it. If a site is running spamd with both the
--vpopmail and --paranoid flags, it is possible for a remote user with the
ability to connect to the spamd daemon to execute arbitrary commands as
the user running the spamd daemon. (CVE-2006-2447)

Note: None of the IMAP or POP servers shipped with Red Hat Enterprise Linux
4 support vpopmail delivery. Running spamd with the --vpopmail and
--paranoid flags is uncommon and not the default startup option as shipped
with Red Hat Enterprise Linux 4.

Spamassassin, as shipped in Red Hat Enterprise Linux 4, performs RBL
lookups against visi.com to help determine if an email is spam. However,
this DNS RBL has recently disappeared, resulting in mail filtering delays
and timeouts.

Users of SpamAssassin should upgrade to these updated packages containing
version 3.0.6 and backported patches, which are not vulnerable to these issues.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Desktop (v. 4)

IA-32:
spamassassin-3.0.6-1.el4.i386.rpm
File outdated by:  RHEA-2008:0738
    MD5: 0978c0b3e20da3fac966c71d13667bea
 
x86_64:
spamassassin-3.0.6-1.el4.x86_64.rpm
File outdated by:  RHEA-2008:0738
    MD5: 0e723a4ff9037961094be458f0da16e3
 
Red Hat Enterprise Linux AS (v. 4)

IA-32:
spamassassin-3.0.6-1.el4.i386.rpm
File outdated by:  RHEA-2008:0738
    MD5: 0978c0b3e20da3fac966c71d13667bea
 
IA-64:
spamassassin-3.0.6-1.el4.ia64.rpm
File outdated by:  RHEA-2008:0738
    MD5: 8e16f3dea0718f28a779ab7265a5bee1
 
PPC:
spamassassin-3.0.6-1.el4.ppc.rpm
File outdated by:  RHEA-2008:0738
    MD5: 1777390bb8c1371d85b5f18ebbf3f50a
 
s390:
spamassassin-3.0.6-1.el4.s390.rpm
File outdated by:  RHEA-2008:0738
    MD5: 19525de01fac4f0d7bb66ea5f5abd955
 
s390x:
spamassassin-3.0.6-1.el4.s390x.rpm
File outdated by:  RHEA-2008:0738
    MD5: 6c35a656281f5d4d5fe856987dfe686b
 
x86_64:
spamassassin-3.0.6-1.el4.x86_64.rpm
File outdated by:  RHEA-2008:0738
    MD5: 0e723a4ff9037961094be458f0da16e3
 
Red Hat Enterprise Linux ES (v. 4)

IA-32:
spamassassin-3.0.6-1.el4.i386.rpm
File outdated by:  RHEA-2008:0738
    MD5: 0978c0b3e20da3fac966c71d13667bea
 
IA-64:
spamassassin-3.0.6-1.el4.ia64.rpm
File outdated by:  RHEA-2008:0738
    MD5: 8e16f3dea0718f28a779ab7265a5bee1
 
x86_64:
spamassassin-3.0.6-1.el4.x86_64.rpm
File outdated by:  RHEA-2008:0738
    MD5: 0e723a4ff9037961094be458f0da16e3
 
Red Hat Enterprise Linux WS (v. 4)

IA-32:
spamassassin-3.0.6-1.el4.i386.rpm
File outdated by:  RHEA-2008:0738
    MD5: 0978c0b3e20da3fac966c71d13667bea
 
IA-64:
spamassassin-3.0.6-1.el4.ia64.rpm
File outdated by:  RHEA-2008:0738
    MD5: 8e16f3dea0718f28a779ab7265a5bee1
 
x86_64:
spamassassin-3.0.6-1.el4.x86_64.rpm
File outdated by:  RHEA-2008:0738
    MD5: 0e723a4ff9037961094be458f0da16e3
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

178580 - /etc/sysconfig/spamassasin loses file context and timestamp
191033 - spamassassin looks up broken NS domain (visi.com)
193865 - CVE-2006-2447 spamassassin arbitrary command execution


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/