Rapid7 Vulnerability & Exploit Database

RHSA-2011:0843: postfix security update

Back to Search

RHSA-2011:0843: postfix security update

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
05/13/2011
Created
07/25/2018
Added
06/02/2011
Modified
07/04/2017

Description

Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL),and TLS.A heap-based buffer over-read flaw was found in the way Postfix performedSASL handlers management for SMTP sessions, when Cyrus SASL authenticationwas enabled. A remote attacker could use this flaw to cause the Postfixsmtpd server to crash via a specially-crafted SASL authentication request.The smtpd process was automatically restarted by the postfix master processafter the time configured with service_throttle_time elapsed.(CVE-2011-1720)Note: Cyrus SASL authentication for Postfix is not enabled by default.Red Hat would like to thank the CERT/CC for reporting this issue. Upstreamacknowledges Thomas Jarosch of Intra2net AG as the original reporter.Users of Postfix are advised to upgrade to these updated packages, whichcontain a backported patch to resolve this issue. After installing thisupdate, the postfix service will be restarted automatically.

Solution(s)

  • redhat-upgrade-postfix
  • redhat-upgrade-postfix-debuginfo
  • redhat-upgrade-postfix-perl-scripts
  • redhat-upgrade-postfix-pflogsumm

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;