📄 bogofilter-sa-2004-01
字号:
bogofilter-SA-2004-01 rfc2047crashTopic: vulnerability in bogofilter/bogolexerAnnouncement: bogofilter-SA-2004-01Writer: Matthias AndreeVersion: 1.01CVE id: CVE-2004-1007Announced: 2004-10-30Category: vulnerabilityType: segmentation fault through malformed inputImpact: denial of serviceCredits: Antti-Juhani Kaijanaho, Clint Adams, David RelsonDanger: mediumURL: http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01Affected: bogofilter (stable) 0.92.6, 0.92.4, 0.92.0, 0.17.5 bogofilter (current) 0.17.4 to 0.92.7 (inclusive)Not affected: bogofilter 0.17.3 and older bogofilter 0.92.8 and newerIntroduced: 2004-03-20 21:46:39 UTC (CVS) 2004-03-20 22:20 bogofilter 0.17.4 released as current 2004-04-02 01:00 bogofilter 0.17.5 released as stableCorrected: 2004-10-08 23:50:04 UTC (CVS) - committed corrected version 2004-10-25 bogofilter 0.92.8 released as stable 2004-10-26 recognized bug as a vulnerabilityReferences: Debian Bug #275373 FreeBSD VuXML ID f4428842-a583-4a4c-89b7-297c3459a1c3 FreeBSD Problem Report #731440. Release history2004-10-28 0.01 initial draft for internal review2004-10-30 0.02 minor revision, added URL2004-10-30 1.00 minor revision by David Relson, published.2004-11-03 1.01 Added CVE candidate number.1. BackgroundBogofilter is a software package to classify a mail as spam ornon-spam. It uses a data base to store words and must be trainedwhich mail are spam and non-spam. It uses the probabilities ofindividual words for classifying the message.Bogofilter understands enough of MIME to decode headers and onlyconsider text parts of mail.2. Problem descriptionAntti-Juhani Kaijanaho provided Debian with a test case that crashedbogofilter 0.92.7. The problem was examined and tracked down to a changein bogofilter's quoted-printable decoder that went into 0.17.4.The pertinent change allowed the quoted-printable decoder to accept LFin encoded words but replaced it by a NUL character, which the callingfunction inside bogofilter could not handle. It attempted to write a NULbyte either one byte past the end of a buffer provided by the lexicalanalyzer or to an address that was the negative of the address of thefirst byte of the "encoded text" part of the encoded word that wassupposed to be decoded.It was decided to announce this as a vulnerability because bogofiltercannot process the pertinent message.3. ImpactThis vulnerability causes bogofilter to catch a "segmentation violation"signal, which causes an immediate program abort.The exact impact depends on the way bogofilter is integrated into thesystem. In common setups, the mail that contains such malformed headersis deferred by the mail delivery agent and remains in the queue, whereit will eventually bounce back to the sender.4. WorkaroundNo reasonable workaround is known at this time.5. SolutionUpgrade your bogofilter to version 0.92.8.bogofilter 0.92.8 is available from sourceforge:http://sourceforge.net/project/showfiles.php?group_id=62265&package_id=59357&release_id=277823Note that a broken-out bugfix patch is not available at this time,because the reversion of the failure-inducing change is not a completefix. Besides, bogofilter is under development and support is limited tothe latest available "current" plus the latest available "stable"versions.END of bogofilter-SA-2004-01 rfc2047crash
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -