<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for spamassassin</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:0446-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-04-04T14:19:31Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-04-04T14:19:31Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-04-04T14:19:31Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for spamassassin</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for spamassassin fixes the following issues:

Security issues fixed:

- CVE-2018-11805: Fixed an issue with delimiter handling in rule files 
  related to is_regexp_valid() (bsc#1118987).
- CVE-2020-1930: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands (bsc#1162197).
- CVE-2020-1931: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands with warnings (bsc#1162200).
  
Non-security issue fixed:

- Altering hash requires restarting loop (bsc#862963).

This update was imported from the SUSE:SLE-15-SP1:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-446</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/67WFM7N2TVSRA4UWEPLP2I7GC7XEK236/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:0446-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1118987</URL>
      <Description>SUSE Bug 1118987</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162197</URL>
      <Description>SUSE Bug 1162197</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162200</URL>
      <Description>SUSE Bug 1162200</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/862963</URL>
      <Description>SUSE Bug 862963</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11805/</URL>
      <Description>SUSE CVE CVE-2018-11805 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-1930/</URL>
      <Description>SUSE CVE CVE-2020-1930 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-1931/</URL>
      <Description>SUSE CVE CVE-2020-1931 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="perl-Mail-SpamAssassin-3.4.2-lp151.8.3.1">
      <FullProductName ProductID="perl-Mail-SpamAssassin-3.4.2-lp151.8.3.1">perl-Mail-SpamAssassin-3.4.2-lp151.8.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp151.8.3.1">
      <FullProductName ProductID="perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp151.8.3.1">perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp151.8.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spamassassin-3.4.2-lp151.8.3.1">
      <FullProductName ProductID="spamassassin-3.4.2-lp151.8.3.1">spamassassin-3.4.2-lp151.8.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="perl-Mail-SpamAssassin-3.4.2-lp151.8.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:perl-Mail-SpamAssassin-3.4.2-lp151.8.3.1">perl-Mail-SpamAssassin-3.4.2-lp151.8.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp151.8.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp151.8.3.1">perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp151.8.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="spamassassin-3.4.2-lp151.8.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:spamassassin-3.4.2-lp151.8.3.1">spamassassin-3.4.2-lp151.8.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA 3.4.3, we recommend that users should only use update channels or 3rd party .cf files from trusted places.</Note>
    </Notes>
    <CVE>CVE-2018-11805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:perl-Mail-SpamAssassin-3.4.2-lp151.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp151.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spamassassin-3.4.2-lp151.8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/67WFM7N2TVSRA4UWEPLP2I7GC7XEK236/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11805.html</URL>
        <Description>CVE-2018-11805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118987</URL>
        <Description>SUSE Bug 1118987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162197</URL>
        <Description>SUSE Bug 1162197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162200</URL>
        <Description>SUSE Bug 1162200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious rule configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. With this bug unpatched, exploits can be injected in a number of scenarios including the same privileges as spamd is run which may be elevated though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places. If you cannot upgrade, do not use 3rd party rulesets, do not use sa-compile and do not run spamd as an account with elevated privileges.</Note>
    </Notes>
    <CVE>CVE-2020-1930</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:perl-Mail-SpamAssassin-3.4.2-lp151.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp151.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spamassassin-3.4.2-lp151.8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/67WFM7N2TVSRA4UWEPLP2I7GC7XEK236/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-1930.html</URL>
        <Description>CVE-2020-1930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162197</URL>
        <Description>SUSE Bug 1162197</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious Configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. This issue is less stealthy and attempts to exploit the issue will throw warnings. Thanks to Damian Lukowski at credativ for reporting the issue ethically. With this bug unpatched, exploits can be injected in a number of scenarios though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places.</Note>
    </Notes>
    <CVE>CVE-2020-1931</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:perl-Mail-SpamAssassin-3.4.2-lp151.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp151.8.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:spamassassin-3.4.2-lp151.8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/67WFM7N2TVSRA4UWEPLP2I7GC7XEK236/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-1931.html</URL>
        <Description>CVE-2020-1931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162197</URL>
        <Description>SUSE Bug 1162197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162200</URL>
        <Description>SUSE Bug 1162200</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
