[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 591/05 - OpenPKG - Security Advisory spamassassin



 
-----BEGIN PGP SIGNED MESSAGE-----


- - ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 591/05 dated 29.07.05  Time: 11:22
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- - ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- - ----------------------------------------------------------------------------------

Title
=====
OpenPKG Security Advisory - Spamassassin

Detail
====== 

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory                            The OpenPKG Project
http://www.openpkg.org/security.html              http://www.openpkg.org
openpkg-security@xxxxxxxxxxx                         openpkg@xxxxxxxxxxx
OpenPKG-SA-2005.015                                          28-Jul-2005
________________________________________________________________________

Package:             spamassassin
Vulnerability:       denial of service
OpenPKG Specific:    no

Affected Releases:   Affected Packages:             Corrected Packages:
OpenPKG CURRENT      <= spamassassin-3.0.3-20050603 >= spamassassin-3.0.4-20050725
OpenPKG 2.4          <= spamassassin-3.0.3-2.4.0    >= spamassassin-3.0.3-2.4.1
OpenPKG 2.3          <= spamassassin-3.0.2-2.3.0    >= spamassassin-3.0.2-2.3.1


Dependent Packages:  none

Description:
  A Denial of Service (DoS) vulnerability exists in the Email spam
  filter SpamAssassin [1]. The problem can be exploited by sending
  certain malformed Email headers. The Common Vulnerabilities and
  Exposures (CVE) project assigned the id CAN-2005-1266 [2] to the
  problem.

  Please check whether you are affected by running "<prefix>/bin/openpkg
  rpm -q spamassassin". If you have the "spamassassin" package installed
  and its version is affected (see above), we recommend that you
  immediately upgrade it (see Solution) [3][4].

Solution:
  Select the updated source RPM appropriate for your OpenPKG release
  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  location, verify its integrity [9], build a corresponding binary
  RPM from it [3] and update your OpenPKG installation by applying
  the binary RPM [4]. For the latest release OpenPKG 2.4, perform the
  following operations to permanently fix the security problem (for
  other releases adjust accordingly).

  $ ftp ftp.openpkg.org
  ftp> bin
  ftp> cd release/2.4/UPD
  ftp> get spamassassin-3.0.3-2.4.1.src.rpm
  ftp> bye
  $ <prefix>/bin/openpkg rpm -v --checksig spamassassin-3.0.3-2.4.1.src.rpm
  $ <prefix>/bin/openpkg rpm --rebuild spamassassin-3.0.3-2.4.1.src.rpm
  $ su -
  # <prefix>/bin/openpkg rpm -Fvh <prefix>/RPM/PKG/spamassassin-3.0.3-2.4.1.*.rpm
________________________________________________________________________

References:
  [1] http://spamassassin.apache.org/
  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1266
  [3] http://www.openpkg.org/tutorial.html#regular-source
  [4] http://www.openpkg.org/tutorial.html#regular-binary
  [5] ftp://ftp.openpkg.org/release/2.4/UPD/spamassassin-3.0.3-2.4.1.src.rpm
  [6] ftp://ftp.openpkg.org/release/2.3/UPD/spamassassin-3.0.2-2.3.1.src.rpm
  [7] ftp://ftp.openpkg.org/release/2.4/UPD/
  [8] ftp://ftp.openpkg.org/release/2.3/UPD/
  [9] http://www.openpkg.org/security.html#signature
________________________________________________________________________

For security reasons, this advisory was digitally signed with the
OpenPGP public key "OpenPKG <openpkg@xxxxxxxxxxx>" (ID 63C4CB9F) of the
OpenPKG project which you can retrieve from http://pgp.openpkg.org and
hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/
for details on how to verify the integrity of this advisory.
________________________________________________________________________

- -----BEGIN PGP SIGNATURE-----
Comment: OpenPKG <openpkg@xxxxxxxxxxx>

iD8DBQFC6L05gHWT4GPEy58RAijtAJ4ns7MSIFBukgwxsWtcUBc2/gcMIACfTMns
z+Y55JlfpZgS5xNZKmvQt8E=
=4UMi
- -----END PGP SIGNATURE-----

- - ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 870 487 0748 Ext 4511
Fax: +44 (0) 870 487 0749

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 870 487 0748 and follow the prompts

- - ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of OpenPKG for the information 
contained in this Briefing. 
- - ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- - ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQCVAwUBQuoEAopao72zK539AQHN2AP+PzYMCViGFJ3luvy98I7ZGFSbonupS8U4
QSGVASU+hv1Got5n/80awBr3cZ0S5fcepophKql84BzGpml1cXla1AgUy7yIb+qC
uErtAIIxi5BY0+HoLIsDe2Qr4SP5UOPKltT1fpgj2kelQwx4wZWj+5HBehbdWPn6
pAE0UC7jk4A=
=qNUe
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________