First published: Sun Sep 16 2018(Updated: )
Apache SpamAssassin 3.4.2 fixes a local user code injection in the meta rule syntax.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/spamassassin | <3.4.2 | 3.4.2 |
debian/spamassassin | 3.4.6-1 4.0.1-1~deb12u1 4.0.1-3 | |
SpamAssassin | <3.4.2 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Debian Linux | =8.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11781 has a high severity rating due to its potential for local code injection.
To fix CVE-2018-11781, upgrade Apache SpamAssassin to version 3.4.2 or later.
CVE-2018-11781 affects Apache SpamAssassin versions prior to 3.4.2.
CVE-2018-11781 is categorized as a local vulnerability that requires access to the system.
Systems running Apache SpamAssassin versions below 3.4.2 are considered vulnerable to CVE-2018-11781.