Unrated severityNVD Advisory· Published Nov 20, 2005· Updated Apr 16, 2026
CVE-2005-3351
CVE-2005-3351
Description
SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients ("To" addresses), which triggers a bus error in Perl.
Affected products
1- cpe:2.3:a:apache:spamassassin:3.0.4:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
17- lwn.net/Alerts/159300/nvdPatchVendor Advisory
- www.gossamer-threads.com/lists/spamassassin/devel/62649nvdPatchVendor Advisory
- issues.apache.org/SpamAssassin/show_bug.cginvd
- osvdb.org/11581nvd
- secunia.com/advisories/17386/nvd
- secunia.com/advisories/17518/nvd
- secunia.com/advisories/17626/nvd
- secunia.com/advisories/17666/nvd
- secunia.com/advisories/17877nvd
- secunia.com/advisories/19158nvd
- www.mandriva.com/security/advisoriesnvd
- www.novell.com/linux/security/advisories/2005_27_sr.htmlnvd
- www.redhat.com/support/errata/RHSA-2006-0129.htmlnvd
- www.securityfocus.com/bid/15373nvd
- www.vupen.com/english/advisories/2005/2364nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/23048nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11125nvd
News mentions
0No linked articles in our index yet.