Jakub Wilk reported a heap-based buffer overflow vulnerability in procmail's formail utility when processing specially-crafted email headers. A remote attacker could use this flaw to cause formail to crash, resulting in a denial of service or data loss. For the oldstable distribution (jessie), this problem has been fixed in version 3.22-24+deb8u1. For the stable distribution (stretch), this problem has been fixed in version 3.22-25+deb9u1. We recommend that you upgrade your procmail packages. For the detailed security status of procmail please refer to its security tracker page at: https://security-tracker.debian.org/tracker/procmail
Jakub Wilk reported a heap-based buffer overflow vulnerability in procmail's formail utility when processing specially-crafted email headers. A remote attacker could use this flaw to cause formail to crash, resulting in a denial of service or data loss.
For the oldstable distribution (jessie), this problem has been fixed in version 3.22-24+deb8u1.
For the stable distribution (stretch), this problem has been fixed in version 3.22-25+deb9u1.
We recommend that you upgrade your procmail packages.
For the detailed security status of procmail please refer to its security tracker page at: https://security-tracker.debian.org/tracker/procmail