First published: Sun Nov 20 2005(Updated: )
SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients ("To" addresses), which triggers a bus error in Perl.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache SpamAssassin | =3.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3351 is considered a moderate severity vulnerability that allows attackers to bypass spam detection in SpamAssassin 3.0.4.
To fix CVE-2005-3351, upgrade SpamAssassin to a newer version that addresses this vulnerability.
CVE-2005-3351 can cause a bus error in Perl, potentially allowing spam emails to be processed without detection.
CVE-2005-3351 specifically affects SpamAssassin version 3.0.4.
To mitigate the risk of CVE-2005-3351, consider implementing additional email filtering mechanisms alongside an upgrade to a patched version of SpamAssassin.