Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in bogofilter
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in bogofilter
ID: SUSE-SU-2012:1652-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Desktop 11 SP2
Datum: Mo, 17. Dezember 2012, 18:28
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5468
Applikationen: bogofilter

Originalnachricht

   SUSE Security Update: Security update for bogofilter
______________________________________________________________________________

Announcement ID: SUSE-SU-2012:1652-1
Rating: important
References: #792939
Cross-References: CVE-2012-5468
Affected Products:
SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:


A heap corruption in bogofilter's base64 decoding function,
caused by incomplete multibyte characters, could have
resulted in a Denial of Service (App. crash) or
potentially allowed the execution of arbitrary code. This
has been fixed.

Security Issue reference:

* CVE-2012-5468
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5468
>


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Desktop 11 SP2:

zypper in -t patch sledsp2-bogofilter-7135

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):

bogofilter-1.1.1-174.27.1


References:

http://support.novell.com/security/cve/CVE-2012-5468.html
https://bugzilla.novell.com/792939
?keywords=68d7ea43f53e4df074e77ba0e35dc785

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung