SpamAssassin BSMTP Mode Buffer...

- AV AC AU C I A
发布: 2003-01-24
修订: 2025-04-13

A buffer overflow vulnerability has been reported for SpamAssassin. The vulnerability exists when SpamAssassin has been configured for use with BSMTP processing. The vulnerability occurs when SpamAssassin is escaping '.' characters when processing email headers. Due to insufficient bounds checking performed by the filter, it is possible for a remote attacker to trigger the buffer overflow condition and execute malicious code. It should be noted that this issue allows an attacker to write the value of the '.' character to the LSB of the value stored above the affected buffer. Under some circumstances this may be the function's saved frame pointer but the exploitability of this issue is highly volatile.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息