Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
SpamAssassin: Execution of arbitrary code
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200606-09
(SpamAssassin: Execution of arbitrary code)
When spamd is run with both the "--vpopmail" (-v) and
"--paranoid" (-P) options, it is vulnerable to an unspecified issue.
With certain configuration options, a local or even remote
attacker could execute arbitrary code with the rights of the user
running spamd, which is root by default, by sending a crafted message
to the spamd daemon. Furthermore, the attack can be remotely
performed if the "--permited-ips" (-A) option is present and specifies
non-local adresses. Note that Gentoo Linux is not vulnerable in the
Don't use both the "--paranoid" (-P) and the "--vpopmail" (-v)
All SpamAssassin users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-filter/spamassassin-3.1.3"
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2006 Michel Arboi
|NEW LENOVO FLEX 4 80SA0006US 14'' FHD TOUCH LAPTOP i5-6200U 8GB 256GB RADEON R5
|#115 Lenovo ThinkPad T410 14" Laptop Intel i5 2.67GHz 4GB 320GB Windows 7 Blue
|LENOVO THINKPAD W520 i7-2920XM 16 GB RAM 1 TB HDD
|SUPER FAST T430 HOT PINK WEBCAM CORE i7 WIN10, 2.9GHz,4GB,320GB,DVD+RW
No Discussions have been posted on this vulnerability.