TITLE: Bogofilter Two Denial of Service Vulnerabilities SECUNIA ADVISORY ID: SA18352 VERIFY ADVISORY: http://secunia.com/advisories/18352/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote SOFTWARE: bogofilter 0.x http://secunia.com/product/822/ DESCRIPTION: Some vulnerabilities have been reported in Bogofilter, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) A boundary error exists in bogofilter and bogolexer when performing character set conversion on invalid input sequences. This can be exploited to cause a heap-based buffer overflow and can cause the application to crash via an email containing specially crafted binary attachments. Successful exploitation requires that bogofilter is used with an unicode database. The vulnerability has been reported in the following versions: * bogofilter (stable) 0.96.2, 0.95.2, 0.94.14, 0.94.12 * bogofilter (current) 0.93.5 through 0.96.2 2) A boundary error exists in bogofilter and bogolexer when processing input containing overly long words. This can be exploited to cause a heap-based buffer overflow and crashes the application if the input contains words whose length exceed 16,384 bytes. The vulnerability has been reported in version 0.96.2. SOLUTION: Update to version 1.0.1 or later. https://sourceforge.net/project/showfiles.php?group_id=62265 The following versions are reportedly not vulnerable: * bogofilter 0.96.3 (current), 0.96.6, and 1.0.0. PROVIDED AND/OR DISCOVERED BY: The vendor credits David Relson and Clint Adams. ORIGINAL ADVISORY: http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-01 http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-02 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------