SPAMAssassin 3.4.5 Spam Filtering System 3.4.5 With Vulnerability

Available Platform Release Platform for Spam Filtering – SPAMASSASSIN 3.4. 5 . In Spamassassin, a comprehensive approach is implemented in making a blocking decision: a message is subjected to a number of checks (contextual analysis, black and white DNSBL lists, trained Bayesian classifiers, signature check, SPF and DKIM authentication, etc.). After evaluating the message with different methods, a certain weight coefficient accumulates. If the calculated coefficient exceeds a specific threshold – the message is blocked or marked as spam. The automatic filtering rules update are supported. The package can be used both on client and on server systems. The Spamassassin code is written in Perl and extends to Apache license.

In a new release, vulnerability (CVE-2020-1946), Allowing Attacking System Commands on the server when Installation of unverified blocking rules obtained from third-party sources.

Among changes not related to security The work is referred to the improvement of OlevBmacro and Askdns plugins, improving the data mapping process in headlines
Received and EnvelopeFrom, fixes in SQL-circuit userpref, improved code checks rbl and hashbl, solve tags TxRep.

It is noted that the development of 3.4.x series, discontinued and fixes and improvements will not longer be placed in this branch. The exception is made only for corrections of vulnerabilities, in case of the appearance of which the release of 3.4.6 will be formed. All activity of developers focuses on the development of a branch of 4.0, in which the full-fledged UTF-8 built-in processing will be implemented.

/Media reports.