Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-1931

Опубликовано: 30 янв. 2020
Источник: ubuntu
Приоритет: medium
CVSS2: 9.3
CVSS3: 8.1

Описание

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious Configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. This issue is less stealthy and attempts to exploit the issue will throw warnings. Thanks to Damian Lukowski at credativ for reporting the issue ethically. With this bug unpatched, exploits can be injected in a number of scenarios though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places.

РелизСтатусПримечание
bionic

released

3.4.2-0ubuntu0.18.04.3
devel

not-affected

3.4.4~rc1-1
eoan

released

3.4.2-1ubuntu0.19.10.2
esm-infra-legacy/trusty

released

3.4.2-0ubuntu0.14.04.1+esm2
esm-infra/bionic

released

3.4.2-0ubuntu0.18.04.3
esm-infra/xenial

released

3.4.2-0ubuntu0.16.04.3
precise/esm

not-affected

3.4.2-0ubuntu0.12.04.4
trusty

ignored

end of standard support
trusty/esm

released

3.4.2-0ubuntu0.14.04.1+esm2
upstream

released

3.4.4~rc1-1

Показывать по

9.3 Critical

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 6.7
redhat
около 6 лет назад

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious Configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. This issue is less stealthy and attempts to exploit the issue will throw warnings. Thanks to Damian Lukowski at credativ for reporting the issue ethically. With this bug unpatched, exploits can be injected in a number of scenarios though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places.

CVSS3: 8.1
nvd
около 6 лет назад

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious Configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. This issue is less stealthy and attempts to exploit the issue will throw warnings. Thanks to Damian Lukowski at credativ for reporting the issue ethically. With this bug unpatched, exploits can be injected in a number of scenarios though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places.

CVSS3: 8.1
debian
около 6 лет назад

A command execution issue was found in Apache SpamAssassin prior to 3. ...

github
больше 3 лет назад

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious Configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. This issue is less stealthy and attempts to exploit the issue will throw warnings. Thanks to Damian Lukowski at credativ for reporting the issue ethically. With this bug unpatched, exploits can be injected in a number of scenarios though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places.

CVSS3: 8.1
fstec
около 6 лет назад

Уязвимость фильтра спама с использованием текстового анализа на основе Perl SpamAssassin, связанная с неприятием мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

9.3 Critical

CVSS2

8.1 High

CVSS3