Home page logo

fulldisclosure logo Full Disclosure mailing list archives

[USN-26-1] bogofilter vulnerability
From: Martin Pitt <martin.pitt () canonical com>
Date: Wed, 17 Nov 2004 14:31:55 +0100

Ubuntu Security Notice USN-26-1           November 17, 2004
bogofilter vulnerability

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:


The problem can be corrected by upgrading the affected package to
version 0.92.0-1ubuntu0.1.  In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

Antti-Juhani Kaijanaho discovered a Denial of Service vulnerability in
bogofilter. The quoted-printable decoder handled certain Base-64
encoded strings in an invalid way which caused a buffer overflow and
an immediate program abort.

The exact impact depends on the way bogofilter is integrated into the
system. In common setups, the mail that contains such malformed
headers is deferred by the mail delivery agent and remains in the
queue, where it will eventually bounce back to the sender.

  Source archives:

      Size/MD5:     8825 09252ecd72a0d71a1f4332f5ade2f76d
      Size/MD5:      597 8b1cf3ccbb7ba6bd97d8caa5a8c48ed4
      Size/MD5:   815622 e90aebf14893f2d850d2a173ea4b815d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

      Size/MD5:   313446 0df2d93a5e9548407bcbda1066f1fe1a

  i386 architecture (x86 compatible Intel/AMD)

      Size/MD5:   278344 335e6ec086e837127ce74b3b2b82c2a5

  powerpc architecture (Apple Macintosh G3/G4/G5)

      Size/MD5:   303866 f78bf60dd489e4499e90f7eff208e0c6

Attachment: signature.asc
Description: Digital signature

  By Date           By Thread  

Current thread:
  • [USN-26-1] bogofilter vulnerability Martin Pitt (Nov 17)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]