Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-EC04F3D0-8CD9-11EB-BB9F-206A8A720317 (CVE-2020-1946): spamassassin -- Malicious rule configuration (.cf) files can be configured to run system commands

Back to Search

FreeBSD: VID-EC04F3D0-8CD9-11EB-BB9F-206A8A720317 (CVE-2020-1946): spamassassin -- Malicious rule configuration (.cf) files can be configured to run system commands

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
03/24/2021
Created
03/27/2021
Added
03/25/2021
Modified
06/03/2021

Description

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From VID-EC04F3D0-8CD9-11EB-BB9F-206A8A720317:

The Apache SpamAssassin project reports:

Apache SpamAssassin 3.4.5 was recently released [1], and fixes

an issue of security note where malicious rule configuration (.cf)

files can be configured to run system commands.

In Apache SpamAssassin before 3.4.5, exploits can be injected in

a number of scenarios. In addition to upgrading to SA 3.4.5,

users should only use update channels or 3rd party .cf files from

trusted places.

Solution(s)

  • freebsd-upgrade-package-spamassassin

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;