The update{_bad,}_phishing_sites scripts in mailscanner 4.79.11-2 downloads files and trusts them without using encryption (e.g., https) or digital signature checking which could allow an attacker to replace certain configuration files (e.g., phishing whitelist) via dns/packet spoofing.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T03:03:18.920Z
Reserved: 2010-09-13T00:00:00
Link: CVE-2010-3292

No data.

Status : Modified
Published: 2019-11-12T21:15:10.253
Modified: 2024-11-21T01:18:27.173
Link: CVE-2010-3292

No data.