Executive Summary
Summary | |
---|---|
Title | postfix security update |
Informations | |||
---|---|---|---|
Name | RHSA-2011:0843 | First vendor Publication | 2011-05-31 |
Vendor | RedHat | Last vendor Modification | 2011-05-31 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated postfix packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL), and TLS. A heap-based buffer over-read flaw was found in the way Postfix performed SASL handlers management for SMTP sessions, when Cyrus SASL authentication was enabled. A remote attacker could use this flaw to cause the Postfix smtpd server to crash via a specially-crafted SASL authentication request. The smtpd process was automatically restarted by the postfix master process after the time configured with service_throttle_time elapsed. (CVE-2011-1720) Note: Cyrus SASL authentication for Postfix is not enabled by default. Red Hat would like to thank the CERT/CC for reporting this issue. Upstream acknowledges Thomas Jarosch of Intra2net AG as the original reporter. Users of Postfix are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, the postfix service will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 699035 - CVE-2011-1720 postfix (smtpd): Crash due to improper management of SASL handlers for SMTP sessions |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2011-0843.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:13019 | |||
Oval ID: | oval:org.mitre.oval:def:13019 | ||
Title: | DSA-2233-1 postfix -- several | ||
Description: | Several vulnerabilities were discovered in Postfix, a mail transfer agent. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-2939 The postinst script grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files. CVE-2011-0411 The STARTTLS implementation does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place. CVE-2011-1720 A heap-based read-only buffer overflow allows malicious clients to crash the smtpd server process using a crafted SASL authentication request. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2233-1 CVE-2009-2939 CVE-2011-0411 CVE-2011-1720 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | postfix |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13968 | |||
Oval ID: | oval:org.mitre.oval:def:13968 | ||
Title: | USN-1131-1 -- postfix vulnerability | ||
Description: | postfix: High-performance mail transport agent An attacker could send crafted input to Postfix and cause it to crash or run programs. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1131-1 CVE-2011-1720 | Version: | 5 |
Platform(s): | Ubuntu 8.04 Ubuntu 10.10 Ubuntu 6.06 Ubuntu 10.04 | Product(s): | postfix |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21899 | |||
Oval ID: | oval:org.mitre.oval:def:21899 | ||
Title: | RHSA-2011:0843: postfix security update (Moderate) | ||
Description: | The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:0843-01 CVE-2011-1720 CESA-2011:0843-CentOS 5 | Version: | 6 |
Platform(s): | Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | postfix |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23665 | |||
Oval ID: | oval:org.mitre.oval:def:23665 | ||
Title: | ELSA-2011:0843: postfix security update (Moderate) | ||
Description: | The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0843-01 CVE-2011-1720 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | postfix |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-33 (Postfix) File : nvt/glsa_201206_33.nasl |
2012-07-30 | Name : CentOS Update for postfix CESA-2011:0843 centos4 x86_64 File : nvt/gb_CESA-2011_0843_postfix_centos4_x86_64.nasl |
2012-07-30 | Name : CentOS Update for postfix CESA-2011:0843 centos5 x86_64 File : nvt/gb_CESA-2011_0843_postfix_centos5_x86_64.nasl |
2011-08-09 | Name : CentOS Update for postfix CESA-2011:0843 centos5 i386 File : nvt/gb_CESA-2011_0843_postfix_centos5_i386.nasl |
2011-08-03 | Name : Debian Security Advisory DSA 2233-1 (postfix) File : nvt/deb_2233_1.nasl |
2011-08-03 | Name : FreeBSD Ports: postfix, postfix-base File : nvt/freebsd_postfix0.nasl |
2011-06-06 | Name : CentOS Update for postfix CESA-2011:0843 centos4 i386 File : nvt/gb_CESA-2011_0843_postfix_centos4_i386.nasl |
2011-06-06 | Name : RedHat Update for postfix RHSA-2011:0843-01 File : nvt/gb_RHSA-2011_0843-01_postfix.nasl |
2011-05-26 | Name : Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability File : nvt/secpod_postfix_cyrus_sasl_memory_corruption_vuln.nasl |
2011-05-23 | Name : Fedora Update for postfix FEDORA-2011-6771 File : nvt/gb_fedora_2011_6771_postfix_fc14.nasl |
2011-05-23 | Name : Fedora Update for postfix FEDORA-2011-6777 File : nvt/gb_fedora_2011_6777_postfix_fc13.nasl |
2011-05-23 | Name : Mandriva Update for postfix MDVSA-2011:090 (postfix) File : nvt/gb_mandriva_MDVSA_2011_090.nasl |
2011-05-17 | Name : Ubuntu Update for postfix USN-1131-1 File : nvt/gb_ubuntu_USN_1131_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
72259 | Postfix SMTP Cyrus SASL Authentication Context Data Reuse Memory Corruption A memory corruption flaw exists in Postfix. The Cyrus SASL library fails to sanitize user-supplied input when authentication types other than PLAIN and LOGIN are used resulting in memory corruption. With a specially crafted request, a remote attacker can potentially execute arbitrary code. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Postfix SMTP Server SASL AUTH Handle Reuse Memory Corruption RuleID : 19708 - Revision : 12 - Type : SERVER-MAIL |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_postfix-110510.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_postfix-110510.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0843.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110531_postfix_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-06-26 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201206-33.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_postfix-7502.nasl - Type : ACT_GATHER_INFO |
2011-06-13 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1131-1.nasl - Type : ACT_GATHER_INFO |
2011-06-02 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-0843.nasl - Type : ACT_GATHER_INFO |
2011-06-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0843.nasl - Type : ACT_GATHER_INFO |
2011-05-19 | Name : The remote mail server is affected by a memory corruption vulnerability. File : postfix_memory_corruption_exploit.nasl - Type : ACT_ATTACK |
2011-05-19 | Name : The remote mail server is potentially affected by a memory corruption vulnera... File : postfix_memory_corruption.nasl - Type : ACT_GATHER_INFO |
2011-05-19 | Name : The remote Fedora host is missing a security update. File : fedora_2011-6784.nasl - Type : ACT_GATHER_INFO |
2011-05-18 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-090.nasl - Type : ACT_GATHER_INFO |
2011-05-18 | Name : The remote Fedora host is missing a security update. File : fedora_2011-6777.nasl - Type : ACT_GATHER_INFO |
2011-05-18 | Name : The remote Fedora host is missing a security update. File : fedora_2011-6771.nasl - Type : ACT_GATHER_INFO |
2011-05-12 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_postfix-110510.nasl - Type : ACT_GATHER_INFO |
2011-05-11 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12707.nasl - Type : ACT_GATHER_INFO |
2011-05-11 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2233.nasl - Type : ACT_GATHER_INFO |
2011-05-10 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_3eb2c100738b11e089f4001e90d46635.nasl - Type : ACT_GATHER_INFO |
2011-05-10 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_postfix-110504.nasl - Type : ACT_GATHER_INFO |
2011-05-10 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_postfix-7503.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:54:46 |
|