Vulnerabilities > CVE-2006-2447 - Remote Command Execution vulnerability in Apache Spamassassin 3.1.0/3.1.1/3.1.2

047910
CVSS 5.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
high complexity
apache
nessus
exploit available
metasploit

Summary

SpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username.

Vulnerable Configurations

Part Description Count
Application
Apache
3

Exploit-Db

  • descriptionSpamAssassin spamd Remote Command Execution. CVE-2006-2447. Remote exploit for linux platform
    idEDB-ID:16920
    last seen2016-02-02
    modified2010-04-30
    published2010-04-30
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16920/
    titleSpamAssassin spamd Remote Command Execution
  • descriptionSpamAssassin spamd. CVE-2006-2447. Remote exploit for unix platform
    idEDB-ID:9914
    last seen2016-02-01
    modified2006-06-06
    published2006-06-06
    reporterpatrick
    sourcehttps://www.exploit-db.com/download/9914/
    titleSpamAssassin spamd <= 3.1.3 - Command Injection

Metasploit

descriptionThis module exploits a flaw in the SpamAssassin spamd service by specifying a malicious vpopmail User header, when running with vpopmail and paranoid modes enabled (non-default). Versions prior to v3.1.3 are vulnerable
idMSF:EXPLOIT/UNIX/MISC/SPAMASSASSIN_EXEC
last seen2020-01-25
modified2017-11-08
published2008-07-19
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/misc/spamassassin_exec.rb
titleSpamAssassin spamd Remote Command Execution

Nessus

  • NASL familyGain a shell remotely
    NASL idSPAMD_VPOPMAIL_CMD_EXEC.NASL
    descriptionThe remote host is running spamd, a daemon belonging to SpamAssassin and used to determine whether messages represent spam. The installed version of spamd on the remote host appears to allow an unauthenticated user to execute arbitrary commands, subject to the privileges of the user under which it operates.
    last seen2020-06-01
    modified2020-06-02
    plugin id21673
    published2006-06-08
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21673
    titleSpamAssassin spamd Crafted Message Arbitrary Command Execution
    code
    #
    # (C) Tenable Network Security
    #
    
    
    include("compat.inc");
    
    if (description)
    {
      script_id(21673);
      script_version("1.17");
    
      script_cve_id("CVE-2006-2447");
      script_bugtraq_id(18290);
    
      script_name(english:"SpamAssassin spamd Crafted Message Arbitrary Command Execution");
      script_summary(english:"Checks for an command execution flaw in spamd");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote server allows execution of arbitrary commands." );
     script_set_attribute(attribute:"description", value:
    "The remote host is running spamd, a daemon belonging to SpamAssassin
    and used to determine whether messages represent spam. 
    
    The installed version of spamd on the remote host appears to allow an
    unauthenticated user to execute arbitrary commands, subject to the
    privileges of the user under which it operates." );
     script_set_attribute(attribute:"see_also", value:"https://spamassassin.apache.org/404.html" );
     script_set_attribute(attribute:"solution", value:
    "Upgrade to SpamAssassin 3.0.6 / 3.1.3 or later." );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
     script_set_attribute(attribute:"metasploit_name", value:'SpamAssassin spamd Remote Command Execution');
     script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/06/08");
     script_set_attribute(attribute:"vuln_publication_date", value: "2006/06/06");
     script_cvs_date("Date: 2018/11/15 20:50:22");
    script_set_attribute(attribute:"plugin_type", value:"remote");
    script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:spamassassin");
    script_end_attributes();
    
     
      script_category(ACT_ATTACK);
      script_family(english:"Gain a shell remotely");
    
      script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
    
      script_dependencies("find_service2.nasl");
      script_require_ports("Services/spamd", 783);
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    
    
    port = get_kb_item("Services/spamd");
    if (!port) port = 783;
    if (!get_port_state(port)) exit(0);
    
    
    # A sample email.
    msg = string(
      "From: nessus\n",
      "To: root\n",
      "Subject: Test\n",
      "Date: Wed, 07 Jun 2006 10:18:42 -0400\n",
      "\n",
      "A simple test of ", SCRIPT_NAME, ".\n"
    );
    
    
    # Make sure spamd works.
    soc = open_sock_tcp(port);
    if (soc)
    {
      req = string(
        "PROCESS SPAMC/1.2\r\n",
        "Content-length: ", strlen(msg), "\r\n",
        "User: nessus\r\n",
        "\r\n",
        msg
      );
      send(socket:soc, data:req);
      res = recv(socket:soc, length:1024);
      close(soc);
    }
    
    
    # If it does...
    if (res && egrep(pattern:"^SPAMD/[^ ]+ [0-9]+ EX_OK", string:res))
    {
      # Make sure the version looks vulnerable, unless we're paranoid.
      if (
        report_paranoia < 2 &&
        "X-Spam-Checker-Version:" >< res &&
        !egrep(pattern:"^X-Spam-Checker-Version: SpamAssassin ([0-2]\.|3\.(0\.[0-5]|1\.[0-2]))", string:res)
      ) exit(0);
    
      # Now try to exploit the flaw to kill our connection.
      soc = open_sock_tcp(port);
      if (soc)
      {
        req = string(
          "PROCESS SPAMC/1.2\r\n",
          "Content-length: ", strlen(msg), "\r\n",
          "User: nessus; kill $PPID\r\n",
          "\r\n",
          msg
        );
        send(socket:soc, data:req);
        res2 = recv(socket:soc, length:1024);
    
        # There's a problem if we didn't receive anything this time.
        if (res2 == NULL) security_warning(port);
      }
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1090.NASL
    descriptionA vulnerability has been discovered in SpamAssassin, a Perl-based spam filter using text analysis, that can allow remote attackers to execute arbitrary commands. This problem only affects systems where spamd is reachable via the internet and used with vpopmail virtual users, via the
    last seen2020-06-01
    modified2020-06-02
    plugin id22632
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22632
    titleDebian DSA-1090-1 : spamassassin - programming error
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-1090. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(22632);
      script_version("1.16");
      script_cvs_date("Date: 2019/08/02 13:32:19");
    
      script_cve_id("CVE-2006-2447");
      script_xref(name:"DSA", value:"1090");
    
      script_name(english:"Debian DSA-1090-1 : spamassassin - programming error");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A vulnerability has been discovered in SpamAssassin, a Perl-based spam
    filter using text analysis, that can allow remote attackers to execute
    arbitrary commands. This problem only affects systems where spamd is
    reachable via the internet and used with vpopmail virtual users, via
    the '-v' / '--vpopmail' switch, and with the '-P' / '--paranoid'
    switch which is not the default setting on Debian."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.debian.org/security/2006/dsa-1090"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the spamd package.
    
    The old stable distribution (woody) is not affected by this problem.
    
    For the stable distribution (sarge) this problem has been fixed in
    version 3.0.3-2sarge1.
    
    For the volatile archive for the stable distribution (sarge) this
    problem has been fixed in version 3.1.0a-0volatile3."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'SpamAssassin spamd Remote Command Execution');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:spamassassin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/06/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/10/14");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/06/06");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"3.1", prefix:"spamassassin", reference:"3.0.3-2sarge1")) flag++;
    if (deb_check(release:"3.1", prefix:"spamc", reference:"3.0.3-2sarge1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2006-103.NASL
    descriptionA flaw was discovered in the way that spamd processes the virtual POP usernames passed to it. If running with the --vpopmail and --paranoid flags, it is possible for a remote user with the ability to connect to the spamd daemon to execute arbitrary commands as the user running spamd. By default, the Spamassassin packages do not start spamd with either of these flags and this usage is uncommon. The updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id21718
    published2006-06-16
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21718
    titleMandrake Linux Security Advisory : spamassassin (MDKSA-2006:103)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandrake Linux Security Advisory MDKSA-2006:103. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(21718);
      script_version ("1.16");
      script_cvs_date("Date: 2019/08/02 13:32:48");
    
      script_cve_id("CVE-2006-2447");
      script_xref(name:"MDKSA", value:"2006:103");
    
      script_name(english:"Mandrake Linux Security Advisory : spamassassin (MDKSA-2006:103)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Mandrake Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A flaw was discovered in the way that spamd processes the virtual POP
    usernames passed to it. If running with the --vpopmail and --paranoid
    flags, it is possible for a remote user with the ability to connect to
    the spamd daemon to execute arbitrary commands as the user running
    spamd.
    
    By default, the Spamassassin packages do not start spamd with either
    of these flags and this usage is uncommon.
    
    The updated packages have been patched to correct this issue."
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'SpamAssassin spamd Remote Command Execution');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:perl-Mail-SpamAssassin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:spamassassin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:spamassassin-spamc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:spamassassin-spamd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:spamassassin-tools");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2006");
      script_set_attribute(attribute:"cpe", value:"x-cpe:/o:mandrakesoft:mandrake_linux:le2005");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/06/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/06/16");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK10.2", reference:"perl-Mail-SpamAssassin-3.0.4-0.3.102mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.2", reference:"spamassassin-3.0.4-0.3.102mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.2", reference:"spamassassin-spamc-3.0.4-0.3.102mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.2", reference:"spamassassin-spamd-3.0.4-0.3.102mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.2", reference:"spamassassin-tools-3.0.4-0.3.102mdk", yank:"mdk")) flag++;
    
    if (rpm_check(release:"MDK2006.0", reference:"perl-Mail-SpamAssassin-3.0.4-3.3.20060mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK2006.0", reference:"spamassassin-3.0.4-3.3.20060mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK2006.0", reference:"spamassassin-spamc-3.0.4-3.3.20060mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK2006.0", reference:"spamassassin-spamd-3.0.4-3.3.20060mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK2006.0", reference:"spamassassin-tools-3.0.4-3.3.20060mdk", yank:"mdk")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2006-598.NASL
    description3.1.3 Resolves CVE-2006-2447. Note that you are affected by this bug only if you launched spamd with both --vpopmail and --paranoid, which is not a common configuration. Also included are bug fixes from 3.1.2. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id24118
    published2007-01-17
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24118
    titleFedora Core 5 : spamassassin-3.1.3-1.fc5 (2006-598)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2006-598.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(24118);
      script_version ("1.16");
      script_cvs_date("Date: 2019/08/02 13:32:24");
    
      script_cve_id("CVE-2006-2447");
      script_xref(name:"FEDORA", value:"2006-598");
    
      script_name(english:"Fedora Core 5 : spamassassin-3.1.3-1.fc5 (2006-598)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora Core host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "3.1.3 Resolves CVE-2006-2447.
    
    Note that you are affected by this bug only if you launched spamd with
    both --vpopmail and --paranoid, which is not a common configuration. 
    
    Also included are bug fixes from 3.1.2.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2006-June/000188.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?1cd6e25a"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Update the affected spamassassin and / or spamassassin-debuginfo
    packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'SpamAssassin spamd Remote Command Execution');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:spamassassin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:spamassassin-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:5");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/06/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/01/17");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^5([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 5.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC5", reference:"spamassassin-3.1.3-1.fc5")) flag++;
    if (rpm_check(release:"FC5", reference:"spamassassin-debuginfo-3.1.3-1.fc5")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "spamassassin / spamassassin-debuginfo");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2007-242.NASL
    descriptionThis upgrades to version 3.1.8, which fixes some bugs and CVE-2007-0451 Malformed HTML Denial of Service. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id24361
    published2007-02-17
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24361
    titleFedora Core 5 : spamassassin-3.1.8-1.fc5 (2007-242)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2007-242.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(24361);
      script_version ("1.15");
      script_cvs_date("Date: 2019/08/02 13:32:25");
    
      script_cve_id("CVE-2006-2447", "CVE-2007-0451");
      script_xref(name:"FEDORA", value:"2007-242");
    
      script_name(english:"Fedora Core 5 : spamassassin-3.1.8-1.fc5 (2007-242)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora Core host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This upgrades to version 3.1.8, which fixes some bugs and
    CVE-2007-0451 Malformed HTML Denial of Service.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2007-February/001460.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?ab33f2db"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Update the affected spamassassin and / or spamassassin-debuginfo
    packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'SpamAssassin spamd Remote Command Execution');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
      script_cwe_id(399);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:spamassassin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:spamassassin-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:5");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2007/02/15");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/02/17");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^5([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 5.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC5", reference:"spamassassin-3.1.8-1.fc5")) flag++;
    if (rpm_check(release:"FC5", reference:"spamassassin-debuginfo-3.1.8-1.fc5")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "spamassassin / spamassassin-debuginfo");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SPAMASSASSIN-1904.NASL
    descriptionThis update fixes the following security problem in SpamAssassin : - CVE-2006-2447: SpamAssassin when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username. At the same time we upgraded SpamAssassin to version 3.1.3, bringing lots of bug fixes and new rules. Please make sure you verify that it still works with your configuration. Also included is now
    last seen2020-06-01
    modified2020-06-02
    plugin id27449
    published2007-10-17
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/27449
    titleopenSUSE 10 Security Update : spamassassin (spamassassin-1904)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2006-0543.NASL
    descriptionUpdated spamassassin packages that fix an arbitrary code execution flaw are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. SpamAssassin provides a way to reduce unsolicited commercial email (SPAM) from incoming email. A flaw was found with the way the Spamassassin spamd daemon processes the virtual pop username passed to it. If a site is running spamd with both the --vpopmail and --paranoid flags, it is possible for a remote user with the ability to connect to the spamd daemon to execute arbitrary commands as the user running the spamd daemon. (CVE-2006-2447) Note: None of the IMAP or POP servers shipped with Red Hat Enterprise Linux 4 support vpopmail delivery. Running spamd with the --vpopmail and --paranoid flags is uncommon and not the default startup option as shipped with Red Hat Enterprise Linux 4. Spamassassin, as shipped in Red Hat Enterprise Linux 4, performs RBL lookups against visi.com to help determine if an email is spam. However, this DNS RBL has recently disappeared, resulting in mail filtering delays and timeouts. Users of SpamAssassin should upgrade to these updated packages containing version 3.0.6 and backported patches, which are not vulnerable to these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id21999
    published2006-07-05
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21999
    titleCentOS 4 : spamassassin (CESA-2006:0543)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2006-658.NASL
    descriptionResolves CVE-2006-2447. Note that you are affected by this bug only if you launched spamd with both --vpopmail and --paranoid, which is not a common configuration. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id24121
    published2007-01-17
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24121
    titleFedora Core 4 : spamassassin-3.0.6-1.fc4 (2006-658)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2006-0543.NASL
    descriptionUpdated spamassassin packages that fix an arbitrary code execution flaw are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. SpamAssassin provides a way to reduce unsolicited commercial email (SPAM) from incoming email. A flaw was found with the way the Spamassassin spamd daemon processes the virtual pop username passed to it. If a site is running spamd with both the --vpopmail and --paranoid flags, it is possible for a remote user with the ability to connect to the spamd daemon to execute arbitrary commands as the user running the spamd daemon. (CVE-2006-2447) Note: None of the IMAP or POP servers shipped with Red Hat Enterprise Linux 4 support vpopmail delivery. Running spamd with the --vpopmail and --paranoid flags is uncommon and not the default startup option as shipped with Red Hat Enterprise Linux 4. Spamassassin, as shipped in Red Hat Enterprise Linux 4, performs RBL lookups against visi.com to help determine if an email is spam. However, this DNS RBL has recently disappeared, resulting in mail filtering delays and timeouts. Users of SpamAssassin should upgrade to these updated packages containing version 3.0.6 and backported patches, which are not vulnerable to these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id21672
    published2006-06-08
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21672
    titleRHEL 4 : spamassassin (RHSA-2006:0543)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2007-584.NASL
    descriptionLocal symlink vulnerability. Fedora is not vulnerable in any default or common configurations. Read upstream
    last seen2020-06-01
    modified2020-06-02
    plugin id25509
    published2007-06-14
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/25509
    titleFedora Core 5 : spamassassin-3.1.9-1.fc5.1 (2007-584)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200606-09.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200606-09 (SpamAssassin: Execution of arbitrary code) When spamd is run with both the
    last seen2020-06-01
    modified2020-06-02
    plugin id21702
    published2006-06-16
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21702
    titleGLSA-200606-09 : SpamAssassin: Execution of arbitrary code

Oval

accepted2013-04-29T04:18:25.849-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
descriptionSpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username.
familyunix
idoval:org.mitre.oval:def:9184
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleSpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username.
version26

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/82332/spamassassin_exec.rb.txt
idPACKETSTORM:82332
last seen2016-12-05
published2009-10-28
reporterpatrick
sourcehttps://packetstormsecurity.com/files/82332/SpamAssassin-spamd-Remote-Command-Execution.html
titleSpamAssassin spamd Remote Command Execution

Redhat

advisories
bugzilla
id193865
titleCVE-2006-2447 spamassassin arbitrary command execution
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 4 is installed
      ovaloval:com.redhat.rhba:tst:20070304025
    • commentspamassassin is earlier than 0:3.0.6-1.el4
      ovaloval:com.redhat.rhsa:tst:20060543001
    • commentspamassassin is signed with Red Hat master key
      ovaloval:com.redhat.rhsa:tst:20060129002
rhsa
idRHSA-2006:0543
released2006-06-06
severityModerate
titleRHSA-2006:0543: spamassassin security update (Moderate)
rpms
  • spamassassin-0:3.0.6-1.el4
  • spamassassin-debuginfo-0:3.0.6-1.el4

Saint

bid18290
descriptionSpamAssassin spamd vpopmail user vulnerability
idmail_misc_spamassassin
osvdb26177
titlespamassassin_spamd_vpopmail
typeremote

Seebug

  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:18007
    last seen2017-11-19
    modified2006-06-06
    published2006-06-06
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-18007
    titleSpamAssassin spamd &lt;= 3.1.3 Command Injection
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:71412
    last seen2017-11-19
    modified2014-07-01
    published2014-07-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-71412
    titleSpamAssassin spamd Remote Command Execution
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:66969
    last seen2017-11-19
    modified2014-07-01
    published2014-07-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-66969
    titleSpamAssassin spamd <= 3.1.3 - Command Injection