Debian Security Advisory

DSA-736-1 spamassassin -- remote denial of service

Date Reported:
01 Jul 2005
Affected Packages:
Security database references:
In the Debian bugtracking system: Bug 314447.
In Mitre's CVE dictionary: CVE-2005-1266.
More information:

A vulnerability was recently found in the way that SpamAssassin parses certain email headers. This vulnerability could cause SpamAssassin to consume a large number of CPU cycles when processing messages containing these headers, leading to a potential denial of service (DOS) attack.

The version of SpamAssassin in the old stable distribution (woody) is not vulnerable.

For the stable distribution (sarge), this problem has been fixed in version 3.0.3-2. Note that packages are not yet ready for certain architectures; these will be released as they become available.

For the unstable distribution (sid), this problem has been fixed in version 3.0.4-1.

We recommend that you upgrade your sarge or sid spamassassin package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Architecture-independent component:
Intel IA-32:
Intel IA-64:
Motorola 680x0:
Big-endian MIPS:
Little-endian MIPS:
IBM S/390:
Sun Sparc:

MD5 checksums of the listed files are available in the original advisory.