DSA-736-1 spamassassin -- remote denial of service

Related Vulnerabilities: CVE-2005-1266  

A vulnerability was recently found in the way that SpamAssassin parses certain email headers. This vulnerability could cause SpamAssassin to consume a large number of CPU cycles when processing messages containing these headers, leading to a potential denial of service (DOS) attack. The version of SpamAssassin in the old stable distribution (woody) is not vulnerable. For the stable distribution (sarge), this problem has been fixed in version 3.0.3-2. Note that packages are not yet ready for certain architectures; these will be released as they become available. For the unstable distribution (sid), this problem has been fixed in version 3.0.4-1. We recommend that you upgrade your sarge or sid spamassassin package.

Debian Security Advisory

DSA-736-1 spamassassin -- remote denial of service

Date Reported:
01 Jul 2005
Affected Packages:
spamassassin
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 314447.
In Mitre's CVE dictionary: CVE-2005-1266.
More information:

A vulnerability was recently found in the way that SpamAssassin parses certain email headers. This vulnerability could cause SpamAssassin to consume a large number of CPU cycles when processing messages containing these headers, leading to a potential denial of service (DOS) attack.

The version of SpamAssassin in the old stable distribution (woody) is not vulnerable.

For the stable distribution (sarge), this problem has been fixed in version 3.0.3-2. Note that packages are not yet ready for certain architectures; these will be released as they become available.

For the unstable distribution (sid), this problem has been fixed in version 3.0.4-1.

We recommend that you upgrade your sarge or sid spamassassin package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/s/spamassassin/spamassassin_3.0.3-2.diff.gz
http://security.debian.org/pool/updates/main/s/spamassassin/spamassassin_3.0.3.orig.tar.gz
http://security.debian.org/pool/updates/main/s/spamassassin/spamassassin_3.0.3-2.dsc
Architecture-independent component:
http://security.debian.org/pool/updates/main/s/spamassassin/spamassassin_3.0.3-2_all.deb
Alpha:
http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_alpha.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_ia64.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_m68k.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_sparc.deb

MD5 checksums of the listed files are available in the original advisory.