Blob Blame History Raw
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

bogofilter-SA-2005-02

Topic:		heap buffer overrun in bogofilter/bogolexer 0.96.2

Announcement:	bogofilter-SA-2005-02
Writer:		Matthias Andree
Version:	1.00
CVE ID:		CVE-2005-4592
Announced:	2006-01-02
Category:	vulnerability
Type:		buffer overrun through long input
Impact:		heap corruption, application crash
Credits:	David Relson, Clint Adams
Danger:		medium
URL:		http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-02

Affected:	bogofilter 0.96.2
		CVS between 2005-09-08T02:49Z and 2005-10-23T15:16Z

Not affected:	bogofilter 0.96.3 "current" (released 2005-10-26)
		bogofilter 0.96.6           (released 2005-11-19)
		bogofilter 1.0.0            (released 2005-12-01)
		bogofilter 1.0.1            (released 2006-01-01)

1. Background
=============

Bogofilter is a software package for classifying a message as spam or
non-spam.  It uses a data base to store words and must be trained
which messages are spam and non-spam. It uses the probabilities of
individual words for classifying the message.

Note that the bogofilter project is issuing security announcements only
for current "stable" releases, and not necessarily for past "stable"
releases.

2. Problem description
======================

Bogofilter's/bogolexer's input handling in version 0.96.2 was not
keeping track of its output buffers properly and could overrun a heap
buffer if the input contained words whose length exceeded 16,384 bytes,
the size of flex's input buffer. A "word" here refers to a contiguous
run of input octets that was not '_' and did not match at least one of
ispunct(), iscntrl() or isspace().

3. Impact
=========

Vulnerable bogofilter and bogolexer applications corrupt their heap and
crash. The consequences are dependent on the local configuration which
is up to the user; in common configurations, messages would be placed
back in the mail queue and ultimately be returned to the sender when the
mail queue lifetime expired, or they might be processed as though
bogofilter had classified them as "ham".

The bogofilter maintainers are not aware of exploits against this
vulnerability in the wild.

4. Solution
===========

Upgrade your bogofilter to version 1.0.1 (or a newer release).

bogofilter is available from SourceForge:

<https://sourceforge.net/project/showfiles.php?group_id=62265>

A. Copyright, License and Warranty
==================================

(C) Copyright 2005 - 2006 by Matthias Andree, <matthias.andree@gmx.de>.
Some rights reserved.

This work is dual-licensed under the
Creative Commons Attribution-NoDerivs 3.0 Germany License (CC BY-ND 3.0),
and the GNU General Public License, v3, or later.

To view a copy of the Creative Commons Attribution-NoDerivs 3.0
Germany license, visit
http://creativecommons.org/licenses/by-nd/3.0/de/deed.en or send a
letter to:

Creative Commons
444 Castro Street
Suite 900
MOUNTAIN VIEW, CALIFORNIA 94041
USA


This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or (at
your option) any later version.

This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program, in the file ../gpl-3.0.txt.
If not, see <http://www.gnu.org/licenses/>.


THIS WORK IS PROVIDED FREE OF CHARGE AND WITHOUT ANY WARRANTIES.
Use the information herein at your own risk.


END of bogofilter-SA-2005-02
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAlHYJCEACgkQvmGDOQUufZXe7gCeMi8d3azCPy4z7OItjMFlE+xs
GQEAoL9mZh3FOdWnafRzKXvH7/dYD7jK
=XkYb
-----END PGP SIGNATURE-----