Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2006:103: spamassassin Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the spamassassin package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2006:103 (spamassassin).
A flaw was discovered in the way that spamd processes the virtual POP
usernames passed to it. If running with the --vpopmail and --paranoid
flags, it is possible for a remote user with the ability to connect to
the spamd daemon to execute arbitrary commands as the user running
By default, the Spamassassin packages do not start spamd with either
of these flags and this usage is uncommon.
The updated packages have been patched to correct this issue.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:103
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.