← Voltar para CVEs
CVE-2019-12420
HIGH7.5
Descricao
In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.
Detalhes CVE
Pontuacao CVSS v3.17.5
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado12/12/2019
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
apache:spamassassindebian:debian_linux
Fraquezas (CWE)
CWE-400
Referencias
http://www.openwall.com/lists/oss-security/2019/12/12/2(security@apache.org)
https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7747(security@apache.org)
https://lists.apache.org/thread.html/5863d6c42fc9595a29566732f12348cde0ca0e41bda91695c62041de%40%3Cannounce.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/5ef362d6da12126fafc81443309ca95d872d1bfd011fe4b2699f0fe9%40%3Cusers.spamassassin.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/64cf76749956dd08f7d5b86ec9f3321f382cfd7fe717ccd1be940c92%40%3Cannounce.spamassassin.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/e3c2367351286b77a74a082e2b66b793cceefa7b6ea9dcd162db4c4b%40%3Cdev.spamassassin.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/r2578c486552637bfedbe624940cc60d6463bd90044c887bdebb75e74%40%3Cusers.spamassassin.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/r3d32ebf97b1245b8237763444e911c4595d2ad5e34a1641840d8146f%40%3Cusers.spamassassin.apache.org%3E(security@apache.org)
https://lists.debian.org/debian-lts-announce/2019/12/msg00019.html(security@apache.org)
https://seclists.org/bugtraq/2019/Dec/27(security@apache.org)
https://svn.apache.org/repos/asf/spamassassin/branches/3.4/build/announcements/3.4.3.txt(security@apache.org)
https://usn.ubuntu.com/4237-1/(security@apache.org)
https://usn.ubuntu.com/4237-2/(security@apache.org)
https://www.debian.org/security/2019/dsa-4584(security@apache.org)
http://www.openwall.com/lists/oss-security/2019/12/12/2(af854a3a-2127-422b-91ae-364da2661108)
https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7747(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/5863d6c42fc9595a29566732f12348cde0ca0e41bda91695c62041de%40%3Cannounce.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/5ef362d6da12126fafc81443309ca95d872d1bfd011fe4b2699f0fe9%40%3Cusers.spamassassin.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/64cf76749956dd08f7d5b86ec9f3321f382cfd7fe717ccd1be940c92%40%3Cannounce.spamassassin.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/e3c2367351286b77a74a082e2b66b793cceefa7b6ea9dcd162db4c4b%40%3Cdev.spamassassin.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r2578c486552637bfedbe624940cc60d6463bd90044c887bdebb75e74%40%3Cusers.spamassassin.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r3d32ebf97b1245b8237763444e911c4595d2ad5e34a1641840d8146f%40%3Cusers.spamassassin.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/12/msg00019.html(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Dec/27(af854a3a-2127-422b-91ae-364da2661108)
https://svn.apache.org/repos/asf/spamassassin/branches/3.4/build/announcements/3.4.3.txt(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4237-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4237-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4584(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.