CVE-2017-15705 (retired)

A denial of service vulnerability was identified that exists in Apache
SpamAssassin before 3.4.2. The vulnerability arises with certain unclosed
tags in emails that cause markup to be handled incorrectly leading to scan
timeouts. In Apache SpamAssassin, using HTML::Parser, we setup an object
and hook into the begin and end tag event handlers In both cases, the
"open" event is immediately followed by a "close" event - even if the tag
*does not* close in the HTML being parsed. Because of this, we are missing
the "text" event to deal with the object normally. This can cause carefully
crafted emails that might take more scan time than expected leading to a
Denial of Service. The issue is possibly a bug or design decision in
HTML::Parser that specifically impacts the way Apache SpamAssassin uses the
module with poorly formed html. The exploit has been seen in the wild but
not believed to have been purposefully part of a Denial of Service attempt.
We are concerned that there may be attempts to abuse the vulnerability in
the future.
Upstream:released (3.4.2-1)
Ubuntu 12.04 ESM (Precise Pangolin):released (3.3.2-2ubuntu1.2)
Ubuntu 14.04 LTS (Trusty Tahr):released (3.4.2-0ubuntu0.14.04.1)
Ubuntu 16.04 LTS (Xenial Xerus):released (3.4.2-0ubuntu0.16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (3.4.2-0ubuntu0.18.04.1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (3.4.2-1)
Ubuntu 19.04 (Disco Dingo):not-affected (3.4.2-1)
More Information

Updated: 2019-03-26 12:25:15 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)