CVE-2005-3351
CVSS5.0
发布时间 :2005-11-20 16:03:00
修订时间 :2011-03-07 21:26:23
NMCOPS    

[原文]SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients ("To" addresses), which triggers a bus error in Perl.


[CNNVD]SpamAssassin总线错误垃圾邮件检测绕过漏洞(CNNVD-200511-278)

        SpamAssassin 是一款开源的反垃圾邮件软件系统。
        SpamAssassin 3.0.4可让攻击者通过会触发Perl中总线错误的具有大量收件人("收件人"地址)的电子邮件绕过垃圾邮件检测。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11125SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients ("To" addresses), which trigger...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3351
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3351
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200511-278
(官方数据源) CNNVD

- 其它链接及资源

http://www.gossamer-threads.com/lists/spamassassin/devel/62649
(VENDOR_ADVISORY)  MLIST  [spamassassin-devel] 20051101 [Bug 4570] Mail with lots of To addresses in header triggers Bus error in Perl [CVE-2005-3351]
http://lwn.net/Alerts/159300/
(VENDOR_ADVISORY)  FEDORA  FEDORA-2005-1065
http://www.vupen.com/english/advisories/2005/2364
(UNKNOWN)  VUPEN  ADV-2005-2364
http://issues.apache.org/SpamAssassin/show_bug.cgi?id=4570
(UNKNOWN)  MISC  http://issues.apache.org/SpamAssassin/show_bug.cgi?id=4570
http://xforce.iss.net/xforce/xfdb/23048
(UNKNOWN)  XF  spamassassin-message-recipients-dos(23048)
http://www.securityfocus.com/bid/15373
(UNKNOWN)  BID  15373
http://www.redhat.com/support/errata/RHSA-2006-0129.html
(UNKNOWN)  REDHAT  RHSA-2006:0129
http://www.novell.com/linux/security/advisories/2005_27_sr.html
(UNKNOWN)  SUSE  SUSE-SR:2005:027
http://www.mandriva.com/security/advisories?name=MDKSA-2005:221
(UNKNOWN)  MANDRAKE  MDKSA-2005:221
http://secunia.com/advisories/19158
(UNKNOWN)  SECUNIA  19158
http://secunia.com/advisories/17877
(UNKNOWN)  SECUNIA  17877
http://secunia.com/advisories/17666/
(UNKNOWN)  SECUNIA  17666
http://secunia.com/advisories/17626/
(UNKNOWN)  SECUNIA  17626
http://secunia.com/advisories/17518/
(UNKNOWN)  SECUNIA  17518
http://secunia.com/advisories/17386/
(UNKNOWN)  SECUNIA  17386
http://osvdb.org/11581
(UNKNOWN)  OSVDB  11581

- 漏洞信息

SpamAssassin总线错误垃圾邮件检测绕过漏洞
中危 其他
2005-11-20 00:00:00 2005-11-21 00:00:00
远程  
        SpamAssassin 是一款开源的反垃圾邮件软件系统。
        SpamAssassin 3.0.4可让攻击者通过会触发Perl中总线错误的具有大量收件人("收件人"地址)的电子邮件绕过垃圾邮件检测。

- 公告与补丁

        暂无数据

- 漏洞信息 (F42046)

Mandriva Linux Security Advisory 2005.221 (PacketStormID:F42046)
2005-12-03 00:00:00
Mandriva  mandriva.com
advisory,perl
linux,mandriva
CVE-2005-3351
[点击下载]

Mandriva Linux Security Advisory - SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients, which triggers a bus error in Perl.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2005:221
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : spamassassin
 Date    : December 2, 2005
 Affected: 10.1, 10.2, 2006.0
 _______________________________________________________________________
 
 Problem Description:
 
 SpamAssassin 3.0.4 allows attackers to bypass spam detection via an
 e-mail with a large number of recipients ("To" addresses), which 
 triggers a bus error in Perl.
 
 Updated packages have been patched to address this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3351
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 10.1:
 bef6bc710a84e631fdd4d4f94a86248c  10.1/RPMS/perl-Mail-SpamAssassin-3.0.4-0.2.101mdk.i586.rpm
 6c3246d2e9860379b267593fbdd2be74  10.1/RPMS/spamassassin-3.0.4-0.2.101mdk.i586.rpm
 75171a7044be3d193e2f9979fd991e62  10.1/RPMS/spamassassin-spamc-3.0.4-0.2.101mdk.i586.rpm
 20f74aae0c01c0819fc0d686a2967979  10.1/RPMS/spamassassin-spamd-3.0.4-0.2.101mdk.i586.rpm
 095c5d7c16b74e4004bf731c427c9b0f  10.1/RPMS/spamassassin-tools-3.0.4-0.2.101mdk.i586.rpm
 c605bdcc9ac46522efaeca7e12c80949  10.1/SRPMS/spamassassin-3.0.4-0.2.101mdk.src.rpm

 Mandriva Linux 10.1/X86_64:
 18805a860661de486a7ae0a716823da2  x86_64/10.1/RPMS/perl-Mail-SpamAssassin-3.0.4-0.2.101mdk.x86_64.rpm
 3fd255f3e04fc2b4380063a9b4ca7403  x86_64/10.1/RPMS/spamassassin-3.0.4-0.2.101mdk.x86_64.rpm
 208127aaeb59bb39b9711b4e260fd47c  x86_64/10.1/RPMS/spamassassin-spamc-3.0.4-0.2.101mdk.x86_64.rpm
 21c05e1003d08a3a9b869971d713c6a7  x86_64/10.1/RPMS/spamassassin-spamd-3.0.4-0.2.101mdk.x86_64.rpm
 086b1cb83ee2f4343116bbece2b37261  x86_64/10.1/RPMS/spamassassin-tools-3.0.4-0.2.101mdk.x86_64.rpm
 c605bdcc9ac46522efaeca7e12c80949  x86_64/10.1/SRPMS/spamassassin-3.0.4-0.2.101mdk.src.rpm

 Mandriva Linux 10.2:
 cc43a9f882ef5a1e20d587d961db8d1a  10.2/RPMS/perl-Mail-SpamAssassin-3.0.4-0.2.102mdk.i586.rpm
 a42113eae2989be9d3af932338535c5d  10.2/RPMS/spamassassin-3.0.4-0.2.102mdk.i586.rpm
 f294a8ebb83ec6245ee4cb477f01510a  10.2/RPMS/spamassassin-spamc-3.0.4-0.2.102mdk.i586.rpm
 d017ebbbe4778c147dcc9903473aa092  10.2/RPMS/spamassassin-spamd-3.0.4-0.2.102mdk.i586.rpm
 bb699d1b5875a53b5daace54ef544d20  10.2/RPMS/spamassassin-tools-3.0.4-0.2.102mdk.i586.rpm
 eec76ea982c797aaa1b18f6b1c35471c  10.2/SRPMS/spamassassin-3.0.4-0.2.102mdk.src.rpm

 Mandriva Linux 10.2/X86_64:
 dccacca323368a74af5af12392e1486c  x86_64/10.2/RPMS/perl-Mail-SpamAssassin-3.0.4-0.2.102mdk.x86_64.rpm
 d104a1c344b1616a881e29e8b4cb495c  x86_64/10.2/RPMS/spamassassin-3.0.4-0.2.102mdk.x86_64.rpm
 410ce462bf261c2e1c73cff6eefa4517  x86_64/10.2/RPMS/spamassassin-spamc-3.0.4-0.2.102mdk.x86_64.rpm
 b8c5daaf23e58bcf8d344178a6d28b72  x86_64/10.2/RPMS/spamassassin-spamd-3.0.4-0.2.102mdk.x86_64.rpm
 04bf196106dfc274c726e9be8bf293ce  x86_64/10.2/RPMS/spamassassin-tools-3.0.4-0.2.102mdk.x86_64.rpm
 eec76ea982c797aaa1b18f6b1c35471c  x86_64/10.2/SRPMS/spamassassin-3.0.4-0.2.102mdk.src.rpm

 Mandriva Linux 2006.0:
 a4f918d6bf1ca8fedc56537d17a63269  2006.0/RPMS/perl-Mail-SpamAssassin-3.0.4-3.2.20060mdk.i586.rpm
 51c25677480258fb2d314bafb0f9dfa8  2006.0/RPMS/spamassassin-3.0.4-3.2.20060mdk.i586.rpm
 b30bf3189682f28947ede6cc32c23cfe  2006.0/RPMS/spamassassin-spamc-3.0.4-3.2.20060mdk.i586.rpm
 af129cafa8c0afacf47848248e2a093f  2006.0/RPMS/spamassassin-spamd-3.0.4-3.2.20060mdk.i586.rpm
 e5c6baedbbb98c975cfdbcfbddf50940  2006.0/RPMS/spamassassin-tools-3.0.4-3.2.20060mdk.i586.rpm
 4b6ae867e1bcfc10a29fc13b04d9a1a6  2006.0/SRPMS/spamassassin-3.0.4-3.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 d76d8b497ef31d06b89a3ff3a6c1fbd9  x86_64/2006.0/RPMS/perl-Mail-SpamAssassin-3.0.4-3.2.20060mdk.x86_64.rpm
 29b0e1af99bc43c46c3d53b4c9e1ca1d  x86_64/2006.0/RPMS/spamassassin-3.0.4-3.2.20060mdk.x86_64.rpm
 f8239556e3a60e290a51d70ccdc3fc48  x86_64/2006.0/RPMS/spamassassin-spamc-3.0.4-3.2.20060mdk.x86_64.rpm
 0f2ac7444f0878e2c6d001d8c52a6bfd  x86_64/2006.0/RPMS/spamassassin-spamd-3.0.4-3.2.20060mdk.x86_64.rpm
 d6770761031d62efcd536f0d087a0f40  x86_64/2006.0/RPMS/spamassassin-tools-3.0.4-3.2.20060mdk.x86_64.rpm
 4b6ae867e1bcfc10a29fc13b04d9a1a6  x86_64/2006.0/SRPMS/spamassassin-3.0.4-3.2.20060mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDkJ/OmqjQ0CJFipgRAro1AKCPiqdJthd1mtamPh2eo1QjrW/aVACgkYRz
tAXCd0pIduEE0FVaW6AxK2M=
=Lwz7
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息

20703
SpamAssassin Long Message Header DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-08-18 Unknow
2005-08-18 Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

SpamAssassin Bus Error Spam Detection Bypass Vulnerability
Failure to Handle Exceptional Conditions 15373
Yes No
2005-11-09 12:00:00 2006-04-13 10:17:00
Irina <irina@nas.net> is credited with the discovery of this vulnerability.

- 受影响的程序版本

Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
SpamAssassin SpamAssassin 3.0.4
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux ES 4
RedHat Desktop 4.0
Red Hat Fedora Core3
Red Hat Enterprise Linux AS 4
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
Mandriva Linux Mandrake 10.2 x86_64
Mandriva Linux Mandrake 10.2
Mandriva Linux Mandrake 10.1 x86_64
Mandriva Linux Mandrake 10.1

- 漏洞讨论

SpamAssassin is prone to a vulnerability that could bypass spam detection. This issue is due to a failure in the application to handle exceptional conditions.

An attacker can exploit this vulnerability to crash a child process, effectively permitting the email to bypass detection and go through.

- 漏洞利用

No exploit is required.

- 解决方案

A vendor patch is available.

Please see the referenced vendor advisories for further information.


SpamAssassin SpamAssassin 3.0.4

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站