Moritz Muehlenhoff
2010-Mar-09 21:50 UTC
[Secure-testing-team] Bug#573228: Arbitrary command execution (report from full-disclosure)
Package: spamass-milter Severity: grave Tags: security Hi Don, The following report was posted to full-disclosure: http://lists.grok.org.uk/pipermail/full-disclosure/2010-March/073489.html Cheers, Moritz -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, ''unstable'') Architecture: i386 (i686) Kernel: Linux 2.6.32-2-686 (SMP w/1 CPU core) Locale: LANG=C, LC_CTYPE=de_DE.ISO-8859-15 at euro (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash Versions of packages spamass-milter depends on: ii adduser 3.112 add and remove users and groups ii libc6 2.10.2-6 Embedded GNU C Library: Shared lib ii libgcc1 1:4.4.3-3 GCC support library pn libmilter1.0.1 <none> (no description available) ii libstdc++6 4.4.3-3 The GNU Standard C++ Library v3 pn spamc <none> (no description available) Versions of packages spamass-milter recommends: pn sendmail | postfix <none> (no description available) ii spamassassin 3.3.0-2 Perl-based spam filter using text spamass-milter suggests no packages.