mailing list archives
From: Matthias Andree <matthias.andree () gmx de>
Date: Tue, 04 Dec 2012 00:02:24 +0100
Topic: heap corruption overrun in bogofilter/bogolexer
Writer: Matthias Andree
CVE ID: CVE-2012-5468
Type: out of bounds write through invalid input
Impact: heap corruption, application crash
Credits: Julius Plenz (FU Berlin, Germany)
Affected: bogofilter <= 1.2.2
SVN checkouts before 2012-10-19 UTC (-r6972)
Not affected: bogofilter 1.2.3 (r6973) and newer
Bogofilter is a software package for classifying a message as spam or
non-spam. It uses a data base to store words and must be trained
which messages are spam and non-spam. It uses the probabilities of
individual words for classifying the message.
Note that the bogofilter project is issuing security announcements only
for current "stable" releases, and not necessarily for past "stable"
2. Problem description
Julius Plenz figured out that bogofilter's/bogolexer's base64 could
overwrite heap memory in the character set conversion in certain
pathological cases of invalid base64 code that decodes to incomplete
Vulnerable bogofilter/bogolexer applications can corrupt their heap and
Upgrade your bogofilter to version 1.2.3 (or a newer release).
bogofilter is available from SourceForge:
A. Copyright, License and Warranty
(C) Copyright 2012 by Matthias Andree, <matthias.andree () gmx de>.
Some rights reserved.
This work is licensed under the
Creative Commons Attribution-NoDerivs 3.0 Germany License (CC BY-ND 3.0).
To view a copy of this license, visit
or send a letter to:
444 Castro Street
MOUNTAIN VIEW, CALIFORNIA 94041
THIS WORK IS PROVIDED FREE OF CHARGE AND WITHOUT ANY WARRANTIES.
Use the information herein at your own risk.
END of bogofilter-SA-2012-01
Description: OpenPGP digital signature
- CVE-2012-5468: bogofilter-SA-2012-01 Matthias Andree (Dec 03)