CVE-2003-1557

Current Description

Off-by-one buffer overflow in spamc of SpamAssassin 2.40 through 2.43, when using BSMTP mode ("-B"), allows remote attackers to execute arbitrary code via email containing headers with leading "." characters.

Basic Data

PublishedDecember 31, 2003
Last ModifiedOctober 19, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-119
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:H/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityHIGH
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.6
SeverityHIGH
Exploitability Score4.9
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationSpamassassinSpamassassin2.40*******
    2.3ApplicationSpamassassinSpamassassin2.41*******
    2.3ApplicationSpamassassinSpamassassin2.42*******
    2.3ApplicationSpamassassinSpamassassin2.43*******

Vulnerable Software List

VendorProductVersions
Spamassassin Spamassassin 2.40, 2.41, 2.42, 2.43

References

NameSourceURLTags
20030123 SpamAssassin / spamc+BSMTP remote buffer overflowhttp://marc.info/?l=bugtraq&m=104342896818777&w=2BUGTRAQ
7983http://secunia.com/advisories/7983SECUNIAVendor Advisory
GLSA-200302-01http://www.securityfocus.com/archive/1/309912/30/26090/threadedGENTOO
20030204 Re: GLSA: Mail-SpamAssasinhttp://www.securityfocus.com/archive/1/310212/30/26030/threadedBUGTRAQ
6679http://www.securityfocus.com/bid/6679BIDPatch
spamassassin-spamc-offbyone-bo(11154)https://exchange.xforce.ibmcloud.com/vulnerabilities/11154XF