First published: Mon Jul 05 2010(Updated: )
A flaw was found in bogofilter's/bogolexer's base64 where it could overwrite memory before its heap buffer, if the base64 input started with an equals sign, such as through misdeclaration of quoted-printable as base64. This would cause bogofilter/bogolexer to corrupt their heap and crash upon receiving such an email message. Something is wrong with the bogofilter home page, the original referenced advisory [1] is currently unavailable, however a copy in svn [2] is. This will also be corrected in upstream version 1.2.2; a patch [3] is available. Please note that upstream version 1.2.2 is not yet available. References: [1] <a href="http://bogofilter.sourceforge.net/security/bogofilter-SA-2010-01">http://bogofilter.sourceforge.net/security/bogofilter-SA-2010-01</a> [2] <a href="http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/doc/bogofilter-SA-2010-01?view=markup&pathrev=6909">http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/doc/bogofilter-SA-2010-01?view=markup&pathrev=6909</a> [3] <a href="http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/src/base64.c?view=patch&r1=6906&r2=6903">http://bogofilter.svn.sourceforge.net/viewvc/bogofilter/trunk/bogofilter/src/base64.c?view=patch&r1=6906&r2=6903</a> This affects bogofilter as shipped in Fedora 12 and 13, as well as EPEL5.
Affected Software | Affected Version | How to fix |
---|---|---|
Evolution | >=1.2.1<=1.2.1 | |
Evolution | <=1.2.2 | |
Fedora | >=12<14 | |
Fedora EPEL5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-611551 has been identified as a critical vulnerability due to its potential to cause memory corruption and application crashes.
To fix REDHAT-BUG-611551, upgrade to the latest patched version of Bogofilter that addresses this memory corruption issue.
REDHAT-BUG-611551 affects Bogofilter version 1.2.1 and prior to version 1.2.2, as well as specific versions of Fedora and EPEL5.
The impact of REDHAT-BUG-611551 includes potential application crashes and the risk of memory corruption when handling incorrectly formatted base64 inputs.
Currently, the recommended solution for REDHAT-BUG-611551 is to apply the necessary updates, as no specific workarounds have been provided.