
====================================================================

                             CERT-Renater

                 Note d'Information No. 2019/VULN412
_____________________________________________________________________

DATE                : 16/12/2019

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache SpamAssassin versions prior
                                        to 3.4.3.

=====================================================================
http://mail-archives.apache.org/mod_mbox/www-announce/201912.mbox/%3c20a4b4a4-b0d2-4a96-deb8-4c96a23964de@apache.org%3e
http://mail-archives.apache.org/mod_mbox/www-announce/201912.mbox/%3c4867fdb1-eaba-98c9-661a-9b5cd974d5c1@apache.org%3e
_____________________________________________________________________

Apache SpamAssassin 3.4.3 was recently released [1], and fixes an issue
of security note where nefarious CF files can be configured to run
system commands without any output or errors.  With this, exploits can
be injected in a number of scenarios.  In addition to upgrading to SA
3.4.3, we recommend that users should only use update channels or 3rd
party .cf files from trusted places.

This issue has been assigned CVE id CVE-2018-11805 [2]

To contact the Apache SpamAssassin security team, please e-mail
security at spamassassin.apache.org.  For more information about Apache
SpamAssassin, visit the http://spamassassin.apache.org/ web site.

Apache SpamAssassin Security Team

[1]:
https://svn.apache.org/repos/asf/spamassassin/branches/3.4/build/announcements/3.4.3.txt

[2]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11805


Kevin A. McGrail
KMcGrail@Apache.org

Member, Apache Software Foundation
Chair Emeritus Apache SpamAssassin Project
https://www.linkedin.com/in/kmcgrail - 703.798.0171

_____________________________________________________________________

Apache SpamAssassin 3.4.3 was recently released [1], and fixes an issue
of security note where a message can be crafted in a way to use
excessive resources.  Upgrading to SA 3.4.3 as soon as possible is the
recommended fix but details will not be shared publicly. Thanks to Joran
Dirk Greef, Ronomon, Cape Town for reporting the issue.

This issue has been assigned CVE id CVE-2019-12420 [2]

To contact the Apache SpamAssassin security team, please e-mail
security at spamassassin.apache.org.  For more information about Apache
SpamAssassin, visit the http://spamassassin.apache.org/ web site.

Apache SpamAssassin Security Team

[1]:
https://svn.apache.org/repos/asf/spamassassin/branches/3.4/build/announcements/3.4.3.txt

[2]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-12420



Kevin A. McGrail
KMcGrail@Apache.org

Member, Apache Software Foundation
Chair Emeritus Apache SpamAssassin Project
https://www.linkedin.com/in/kmcgrail - 703.798.0171

=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================




