USN-26-1: bogofilter vulnerability
Posted on: 11/17/2004 02:48 PM

A bogofilter update has been released for Ubuntu Linux 4.10

Ubuntu Security Notice USN-26-1 November 17, 2004
bogofilter vulnerability

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:


The problem can be corrected by upgrading the affected package to version 0.92.0-1ubuntu0.1. In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

Antti-Juhani Kaijanaho discovered a Denial of Service vulnerability in bogofilter. The quoted-printable decoder handled certain Base-64 encoded strings in an invalid way which caused a buffer overflow and an immediate program abort.

The exact impact depends on the way bogofilter is integrated into the system. In common setups, the mail that contains such malformed headers is deferred by the mail delivery agent and remains in the queue, where it will eventually bounce back to the sender.

Source archives:
Size/MD5: 8825 09252ecd72a0d71a1f4332f5ade2f76d
Size/MD5: 597 8b1cf3ccbb7ba6bd97d8caa5a8c48ed4
Size/MD5: 815622 e90aebf14893f2d850d2a173ea4b815d

amd64 architecture (Athlon64, Opteron, EM64T Xeon)
Size/MD5: 313446 0df2d93a5e9548407bcbda1066f1fe1a

i386 architecture (x86 compatible Intel/AMD)
Size/MD5: 278344 335e6ec086e837127ce74b3b2b82c2a5

powerpc architecture (Apple Macintosh G3/G4/G5)
Size/MD5: 303866 f78bf60dd489e4499e90f7eff208e0c6

Printed from Linux Compatible (