ALAS-2018-1091

Related Vulnerabilities: CVE-2017-15705   CVE-2018-11780   CVE-2018-11781  

A flaw was found in the way a local user on the SpamAssassin server could inject code in the meta rule syntax. This could cause the arbitrary code execution on the server when these rules are being processed.(CVE-2018-11781) A potential Remote Code Execution bug exists with the PDFInfo plugin in Apache SpamAssassin before 3.4.2.(CVE-2018-11780) A flaw was found in the way SpamAssassin processes HTML email containing unclosed HTML tags. A carefully crafted mail message could cause SpamAssassin to consume significant resources. If a large number of these messages are sent, a denial of service could occur potentially delaying or preventing the delivery of email.(CVE-2017-15705)

ALAS-2018-1091


Amazon Linux AMI Security Advisory: ALAS-2018-1091
Advisory Release Date: 2018-10-17 21:58 Pacific
Advisory Updated Date: 2018-10-18 22:19 Pacific
Severity: Important

Issue Overview:

A flaw was found in the way a local user on the SpamAssassin server could inject code in the meta rule syntax. This could cause the arbitrary code execution on the server when these rules are being processed.(CVE-2018-11781)

A potential Remote Code Execution bug exists with the PDFInfo plugin in Apache SpamAssassin before 3.4.2.(CVE-2018-11780)

A flaw was found in the way SpamAssassin processes HTML email containing unclosed HTML tags. A carefully crafted mail message could cause SpamAssassin to consume significant resources. If a large number of these messages are sent, a denial of service could occur potentially delaying or preventing the delivery of email.(CVE-2017-15705)


Affected Packages:

spamassassin


Issue Correction:
Run yum update spamassassin to update your system.

New Packages:
i686:
    spamassassin-debuginfo-3.4.2-2.14.amzn1.i686
    spamassassin-3.4.2-2.14.amzn1.i686

src:
    spamassassin-3.4.2-2.14.amzn1.src

x86_64:
    spamassassin-debuginfo-3.4.2-2.14.amzn1.x86_64
    spamassassin-3.4.2-2.14.amzn1.x86_64