Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2011-1720

Back to Search

SUSE Linux Security Vulnerability: CVE-2011-1720

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
05/13/2011
Created
07/25/2018
Added
02/17/2015
Modified
07/04/2017

Description

The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.

Solution(s)

  • suse-upgrade-postfix
  • suse-upgrade-postfix-devel
  • suse-upgrade-postfix-doc
  • suse-upgrade-postfix-mysql
  • suse-upgrade-postfix-postgresql

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;