Executive Summary
Summary | |
---|---|
Title | courier vulnerability |
Informations | |||
---|---|---|---|
Name | USN-174-1 | First vendor Publication | 2005-08-26 |
Vendor | Ubuntu | Last vendor Modification | 2005-08-26 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) The following packages are affected: courier-base The problem can be corrected by upgrading the affected package to version 0.47-3ubuntu1.1. In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: A Denial of Service vulnerability has been discovered in the Courier mail server. Due to a flawed status code check, failed DNS (domain name service) queries for SPF (sender policy framework) were not handled properly and could lead to memory corruption. A malicious DNS server could exploit this to crash the Courier server. However, SPF is not enabled by default, so you are only vulnerable if you explicitly enabled it. The Ubuntu 4.10 version of courier is not affected by this. |
Original Source
Url : http://www.ubuntu.com/usn/USN-174-1 |
Alert History
Date | Informations |
---|---|
2016-04-26 18:16:58 |
|
2014-02-17 12:01:34 |
|
2013-05-11 12:25:10 |
|