| 2. Problem description | ====================== | | Bogofilter's/bogolexer's base64 could overwrite memory before its heap | buffer if the base64 input started with an equals sign, such as through | misdeclaration of quoted-printable as base64. | | 3. Impact | ========= | | Vulnerable bogofilter and bogolexer applications can corrupt their heap and | crash. The consequences are dependent on the local configuration, memory | layout and operating system features. 1.2.2 is in the tree.
CVE-2010-2494 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2494): Multiple buffer underflows in the base64 decoder in base64.c in (1) bogofilter and (2) bogolexer in bogofilter before 1.2.2 allow remote attackers to cause a denial of service (heap memory corruption and application crash) via an e-mail message with invalid base64 data that begins with an = (equals) character.
*** Bug 329955 has been marked as a duplicate of this bug. ***
Arches, please test and mark stable: =mail-filter/bogofilter-1.2.2 Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 sh sparc x86"
amd64/arm/x86 stable
Stable for HPPA PPC.
alpha/ia64/sh/sparc stable
Marked ppc64 stable.
all arches done
Closing noglsa as only DoS is confirmed. Please remove vulnerable versions from the tree.