Vulnerabilites related to postfix - postfix
CVE-2012-0811 (GCVE-0-2012-0811)
Vulnerability from cvelistv5
Published
2014-10-01 14:00
Modified
2024-08-06 18:38
Severity ?
CWE
  • n/a
Summary
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:14.403Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "51680",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51680"
          },
          {
            "name": "[oss-security] 20120126 CVE request: PostfixAdmin SQL injections and XSS",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/01/26/5"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT"
          },
          {
            "name": "[oss-security] 20120127 Re: CVE request: PostfixAdmin SQL injections and XSS",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/01/27/5"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-10-01T13:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "51680",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51680"
        },
        {
          "name": "[oss-security] 20120126 CVE request: PostfixAdmin SQL injections and XSS",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/01/26/5"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT"
        },
        {
          "name": "[oss-security] 20120127 Re: CVE request: PostfixAdmin SQL injections and XSS",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/01/27/5"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-0811",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "51680",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51680"
            },
            {
              "name": "[oss-security] 20120126 CVE request: PostfixAdmin SQL injections and XSS",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/01/26/5"
            },
            {
              "name": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin",
              "refsource": "MISC",
              "url": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin"
            },
            {
              "name": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT",
              "refsource": "CONFIRM",
              "url": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT"
            },
            {
              "name": "[oss-security] 20120127 Re: CVE request: PostfixAdmin SQL injections and XSS",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/01/27/5"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-0811",
    "datePublished": "2014-10-01T14:00:00",
    "dateReserved": "2012-01-19T00:00:00",
    "dateUpdated": "2024-08-06T18:38:14.403Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-2937 (GCVE-0-2008-2937)
Vulnerability from cvelistv5
Published
2008-08-18 19:00
Modified
2024-08-07 09:21
Severity ?
CWE
  • n/a
Summary
Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.
References
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/32231 third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2009:224 vendor-advisory, x_refsource_MANDRIVA
ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY x_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html vendor-advisory, x_refsource_FEDORA
https://issues.rpath.com/browse/RPL-2689 x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/495632/100/0/threaded mailing-list, x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/44461 vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/30691 vdb-entry, x_refsource_BID
http://wiki.rpath.com/Advisories:rPSA-2008-0259 x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html vendor-advisory, x_refsource_SUSE
http://www.redhat.com/support/errata/RHSA-2011-0422.html vendor-advisory, x_refsource_REDHAT
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 x_refsource_CONFIRM
ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY x_refsource_CONFIRM
http://secunia.com/advisories/31500 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31477 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31485 third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2385 vdb-entry, x_refsource_VUPEN
http://security.gentoo.org/glsa/glsa-200808-12.xml vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:21:34.918Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2008-8595",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
          },
          {
            "name": "32231",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32231"
          },
          {
            "name": "MDVSA-2009:224",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:224"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY"
          },
          {
            "name": "FEDORA-2008-8593",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2689"
          },
          {
            "name": "20080821 rPSA-2008-0259-1 postfix",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/495632/100/0/threaded"
          },
          {
            "name": "postfix-email-information-disclosure(44461)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44461"
          },
          {
            "name": "30691",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30691"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0259"
          },
          {
            "name": "SUSE-SA:2008:040",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html"
          },
          {
            "name": "RHSA-2011:0422",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0422.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY"
          },
          {
            "name": "31500",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31500"
          },
          {
            "name": "31477",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31477"
          },
          {
            "name": "31485",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31485"
          },
          {
            "name": "ADV-2008-2385",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2385"
          },
          {
            "name": "GLSA-200808-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200808-12.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-08-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user\u0027s account name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2008-8595",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
        },
        {
          "name": "32231",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32231"
        },
        {
          "name": "MDVSA-2009:224",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:224"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY"
        },
        {
          "name": "FEDORA-2008-8593",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2689"
        },
        {
          "name": "20080821 rPSA-2008-0259-1 postfix",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/495632/100/0/threaded"
        },
        {
          "name": "postfix-email-information-disclosure(44461)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44461"
        },
        {
          "name": "30691",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30691"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0259"
        },
        {
          "name": "SUSE-SA:2008:040",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html"
        },
        {
          "name": "RHSA-2011:0422",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0422.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY"
        },
        {
          "name": "31500",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31500"
        },
        {
          "name": "31477",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31477"
        },
        {
          "name": "31485",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31485"
        },
        {
          "name": "ADV-2008-2385",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2385"
        },
        {
          "name": "GLSA-200808-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200808-12.xml"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-2937",
    "datePublished": "2008-08-18T19:00:00",
    "dateReserved": "2008-06-30T00:00:00",
    "dateUpdated": "2024-08-07T09:21:34.918Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12063 (GCVE-0-2020-12063)
Vulnerability from cvelistv5
Published
2020-04-24 11:59
Modified
2024-08-04 11:48
Severity ?
CWE
  • n/a
Summary
A certain Postfix 2.10.1-7 package could allow an attacker to send an email from an arbitrary-looking sender via a homoglyph attack, as demonstrated by the similarity of \xce\xbf to the 'o' character. This is potentially relevant when the /etc/postfix/sender_login feature is used, because a spoofed outbound message that uses a configured sender address is blocked with a "Sender address rejected: not logged in" error message, but a spoofed outbound message that uses a homoglyph of a configured sender address is not blocked. NOTE: some third parties argue that any missed blocking of spoofed outbound messages - except for exact matches to a sender address in the /etc/postfix/sender_login file - is outside the design goals of Postfix and thus cannot be considered a Postfix vulnerability
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:48:57.775Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2020/04/23/3"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2020/04/23/12"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A certain Postfix 2.10.1-7 package could allow an attacker to send an email from an arbitrary-looking sender via a homoglyph attack, as demonstrated by the similarity of \\xce\\xbf to the \u0027o\u0027 character. This is potentially relevant when the /etc/postfix/sender_login feature is used, because a spoofed outbound message that uses a configured sender address is blocked with a \"Sender address rejected: not logged in\" error message, but a spoofed outbound message that uses a homoglyph of a configured sender address is not blocked. NOTE: some third parties argue that any missed blocking of spoofed outbound messages - except for exact matches to a sender address in the /etc/postfix/sender_login file - is outside the design goals of Postfix and thus cannot be considered a Postfix vulnerability"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-24T12:05:42",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.openwall.com/lists/oss-security/2020/04/23/3"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.openwall.com/lists/oss-security/2020/04/23/12"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-12063",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED ** A certain Postfix 2.10.1-7 package could allow an attacker to send an email from an arbitrary-looking sender via a homoglyph attack, as demonstrated by the similarity of \\xce\\xbf to the \u0027o\u0027 character. This is potentially relevant when the /etc/postfix/sender_login feature is used, because a spoofed outbound message that uses a configured sender address is blocked with a \"Sender address rejected: not logged in\" error message, but a spoofed outbound message that uses a homoglyph of a configured sender address is not blocked. NOTE: some third parties argue that any missed blocking of spoofed outbound messages - except for exact matches to a sender address in the /etc/postfix/sender_login file - is outside the design goals of Postfix and thus cannot be considered a Postfix vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.openwall.com/lists/oss-security/2020/04/23/3",
              "refsource": "MISC",
              "url": "https://www.openwall.com/lists/oss-security/2020/04/23/3"
            },
            {
              "name": "https://www.openwall.com/lists/oss-security/2020/04/23/12",
              "refsource": "MISC",
              "url": "https://www.openwall.com/lists/oss-security/2020/04/23/12"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-12063",
    "datePublished": "2020-04-24T11:59:03",
    "dateReserved": "2020-04-22T00:00:00",
    "dateUpdated": "2024-08-04T11:48:57.775Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-10140 (GCVE-0-2017-10140)
Vulnerability from cvelistv5
Published
2018-04-16 16:00
Modified
2024-08-05 17:33
Severity ?
CWE
  • n/a
Summary
Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 might allow local users to gain privileges by leveraging undocumented functionality in Berkeley DB 2.x and later, related to reading settings from DB_CONFIG in the current directory.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:33:16.056Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-sec] 20170611 Berkeley DB reads DB_CONFIG from cwd",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2017/q3/285"
          },
          {
            "name": "RHSA-2019:0366",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:0366"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.postfix.org/announcements/postfix-3.2.2.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-06-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 might allow local users to gain privileges by leveraging undocumented functionality in Berkeley DB 2.x and later, related to reading settings from DB_CONFIG in the current directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-15T17:34:25",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-sec] 20170611 Berkeley DB reads DB_CONFIG from cwd",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2017/q3/285"
        },
        {
          "name": "RHSA-2019:0366",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:0366"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.postfix.org/announcements/postfix-3.2.2.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-10140",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 might allow local users to gain privileges by leveraging undocumented functionality in Berkeley DB 2.x and later, related to reading settings from DB_CONFIG in the current directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-sec] 20170611 Berkeley DB reads DB_CONFIG from cwd",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2017/q3/285"
            },
            {
              "name": "RHSA-2019:0366",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:0366"
            },
            {
              "name": "https://www.oracle.com/security-alerts/cpujul2020.html",
              "refsource": "MISC",
              "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
            },
            {
              "name": "http://www.postfix.org/announcements/postfix-3.2.2.html",
              "refsource": "CONFIRM",
              "url": "http://www.postfix.org/announcements/postfix-3.2.2.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-10140",
    "datePublished": "2018-04-16T16:00:00",
    "dateReserved": "2017-06-21T00:00:00",
    "dateUpdated": "2024-08-05T17:33:16.056Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-51764 (GCVE-0-2023-51764)
Vulnerability from cvelistv5
Published
2023-12-24 00:00
Modified
2024-08-02 22:48
Severity ?
CWE
  • n/a
Summary
Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T22:48:11.093Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.postfix.org/smtp-smuggling.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"
          },
          {
            "name": "[oss-security] 20231224 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/24/1"
          },
          {
            "name": "[oss-security] 20231225 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/25/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255563"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2023-51764"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/eeenvik1/CVE-2023-51764"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/duy-31/CVE-2023-51764"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.youtube.com/watch?v=V8KPV96g1To"
          },
          {
            "name": "FEDORA-2024-c839e7294f",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRLF5SOS7TP5N7FQSEK2NFNB44ISVTZC/"
          },
          {
            "name": "FEDORA-2024-5c186175f2",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ5WXFCW2N6G2PH3JXDTYW5PH5EBQEGO/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lwn.net/Articles/956533/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2024/01/22/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.postfix.org/announcements/postfix-3.8.5.html"
          },
          {
            "name": "[debian-lts-announce] 20240130 [SECURITY] [DLA 3725-1] postfix security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00020.html"
          },
          {
            "name": "[oss-security] 20240508 Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2024/05/09/3"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports \u003cLF\u003e.\u003cCR\u003e\u003cLF\u003e but some other popular e-mail servers do not. To prevent attack variants (by always disallowing \u003cLF\u003e without \u003cCR\u003e), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-10T18:07:59.991035",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.postfix.org/smtp-smuggling.html"
        },
        {
          "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"
        },
        {
          "name": "[oss-security] 20231224 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/24/1"
        },
        {
          "name": "[oss-security] 20231225 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/25/1"
        },
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255563"
        },
        {
          "url": "https://access.redhat.com/security/cve/CVE-2023-51764"
        },
        {
          "url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html"
        },
        {
          "url": "https://github.com/eeenvik1/CVE-2023-51764"
        },
        {
          "url": "https://github.com/duy-31/CVE-2023-51764"
        },
        {
          "url": "https://www.youtube.com/watch?v=V8KPV96g1To"
        },
        {
          "name": "FEDORA-2024-c839e7294f",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRLF5SOS7TP5N7FQSEK2NFNB44ISVTZC/"
        },
        {
          "name": "FEDORA-2024-5c186175f2",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ5WXFCW2N6G2PH3JXDTYW5PH5EBQEGO/"
        },
        {
          "url": "https://lwn.net/Articles/956533/"
        },
        {
          "url": "https://www.openwall.com/lists/oss-security/2024/01/22/1"
        },
        {
          "url": "https://www.postfix.org/announcements/postfix-3.8.5.html"
        },
        {
          "name": "[debian-lts-announce] 20240130 [SECURITY] [DLA 3725-1] postfix security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00020.html"
        },
        {
          "name": "[oss-security] 20240508 Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2024/05/09/3"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-51764",
    "datePublished": "2023-12-24T00:00:00",
    "dateReserved": "2023-12-24T00:00:00",
    "dateUpdated": "2024-08-02T22:48:11.093Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-2936 (GCVE-0-2008-2936)
Vulnerability from cvelistv5
Published
2008-08-18 19:00
Modified
2024-08-07 09:21
Severity ?
CWE
  • n/a
Summary
Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
References
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html vendor-advisory, x_refsource_FEDORA
ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.3.15.HISTORY x_refsource_CONFIRM
http://secunia.com/advisories/32231 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31469 third-party-advisory, x_refsource_SECUNIA
ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY x_refsource_CONFIRM
http://www.debian.org/security/2008/dsa-1629 vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/31530 third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html vendor-advisory, x_refsource_FEDORA
https://issues.rpath.com/browse/RPL-2689 x_refsource_CONFIRM
http://www.securitytracker.com/id?1020700 vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/archive/1/495632/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.kb.cert.org/vuls/id/938323 third-party-advisory, x_refsource_CERT-VN
http://article.gmane.org/gmane.mail.postfix.announce/110 mailing-list, x_refsource_MLIST
http://securityreason.com/securityalert/4160 third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/bid/30691 vdb-entry, x_refsource_BID
http://wiki.rpath.com/Advisories:rPSA-2008-0259 x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html vendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/31474 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/495882/100/0/threaded mailing-list, x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/44460 vdb-entry, x_refsource_XF
ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY x_refsource_CONFIRM
https://www.exploit-db.com/exploits/6337 exploit, x_refsource_EXPLOIT-DB
http://www.redhat.com/support/errata/RHSA-2008-0839.html vendor-advisory, x_refsource_REDHAT
ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY x_refsource_CONFIRM
http://secunia.com/advisories/31500 third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10033 vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/31477 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31485 third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/636-1/ vendor-advisory, x_refsource_UBUNTU
http://www.mandriva.com/security/advisories?name=MDVSA-2008:171 vendor-advisory, x_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/495474/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/2385 vdb-entry, x_refsource_VUPEN
http://security.gentoo.org/glsa/glsa-200808-12.xml vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:21:34.272Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2008-8595",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.3.15.HISTORY"
          },
          {
            "name": "32231",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32231"
          },
          {
            "name": "31469",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31469"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY"
          },
          {
            "name": "DSA-1629",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1629"
          },
          {
            "name": "31530",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31530"
          },
          {
            "name": "FEDORA-2008-8593",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2689"
          },
          {
            "name": "1020700",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020700"
          },
          {
            "name": "20080821 rPSA-2008-0259-1 postfix",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/495632/100/0/threaded"
          },
          {
            "name": "VU#938323",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/938323"
          },
          {
            "name": "[postfix-announce] 20080814 Postfix local privilege escalation via hardlinked symlinks",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://article.gmane.org/gmane.mail.postfix.announce/110"
          },
          {
            "name": "4160",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4160"
          },
          {
            "name": "30691",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30691"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0259"
          },
          {
            "name": "SUSE-SA:2008:040",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html"
          },
          {
            "name": "31474",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31474"
          },
          {
            "name": "20080831 PoCfix (PoC for Postfix local root vuln - CVE-2008-2936)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/495882/100/0/threaded"
          },
          {
            "name": "postfix-symlink-code-execution(44460)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44460"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY"
          },
          {
            "name": "6337",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6337"
          },
          {
            "name": "RHSA-2008:0839",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0839.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY"
          },
          {
            "name": "31500",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31500"
          },
          {
            "name": "oval:org.mitre.oval:def:10033",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10033"
          },
          {
            "name": "31477",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31477"
          },
          {
            "name": "31485",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31485"
          },
          {
            "name": "USN-636-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/636-1/"
          },
          {
            "name": "MDVSA-2008:171",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:171"
          },
          {
            "name": "20080814 Postfix local privilege escalation via hardlinked symlinks",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/495474/100/0/threaded"
          },
          {
            "name": "ADV-2008-2385",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2385"
          },
          {
            "name": "GLSA-200808-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200808-12.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-08-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message.  NOTE: this can be leveraged to gain privileges if there is a symlink to an init script."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2008-8595",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.3.15.HISTORY"
        },
        {
          "name": "32231",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32231"
        },
        {
          "name": "31469",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31469"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY"
        },
        {
          "name": "DSA-1629",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1629"
        },
        {
          "name": "31530",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31530"
        },
        {
          "name": "FEDORA-2008-8593",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2689"
        },
        {
          "name": "1020700",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020700"
        },
        {
          "name": "20080821 rPSA-2008-0259-1 postfix",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/495632/100/0/threaded"
        },
        {
          "name": "VU#938323",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/938323"
        },
        {
          "name": "[postfix-announce] 20080814 Postfix local privilege escalation via hardlinked symlinks",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://article.gmane.org/gmane.mail.postfix.announce/110"
        },
        {
          "name": "4160",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4160"
        },
        {
          "name": "30691",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30691"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0259"
        },
        {
          "name": "SUSE-SA:2008:040",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html"
        },
        {
          "name": "31474",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31474"
        },
        {
          "name": "20080831 PoCfix (PoC for Postfix local root vuln - CVE-2008-2936)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/495882/100/0/threaded"
        },
        {
          "name": "postfix-symlink-code-execution(44460)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44460"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY"
        },
        {
          "name": "6337",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6337"
        },
        {
          "name": "RHSA-2008:0839",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0839.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY"
        },
        {
          "name": "31500",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31500"
        },
        {
          "name": "oval:org.mitre.oval:def:10033",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10033"
        },
        {
          "name": "31477",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31477"
        },
        {
          "name": "31485",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31485"
        },
        {
          "name": "USN-636-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/636-1/"
        },
        {
          "name": "MDVSA-2008:171",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:171"
        },
        {
          "name": "20080814 Postfix local privilege escalation via hardlinked symlinks",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/495474/100/0/threaded"
        },
        {
          "name": "ADV-2008-2385",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2385"
        },
        {
          "name": "GLSA-200808-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200808-12.xml"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-2936",
    "datePublished": "2008-08-18T19:00:00",
    "dateReserved": "2008-06-30T00:00:00",
    "dateUpdated": "2024-08-07T09:21:34.272Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2939 (GCVE-0-2009-2939)
Vulnerability from cvelistv5
Published
2009-09-21 19:00
Modified
2024-08-07 06:07
Severity ?
CWE
  • n/a
Summary
The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
References
http://www.openwall.com/lists/oss-security/2009/09/18/6 mailing-list, x_refsource_MLIST
http://www.debian.org/security/2011/dsa-2233 vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:07:37.330Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20090918 Insecure pid directory permissions for postfix on Debian / Ubuntu",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/09/18/6"
          },
          {
            "name": "DSA-2233",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2233"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-09-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-08-23T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20090918 Insecure pid directory permissions for postfix on Debian / Ubuntu",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/09/18/6"
        },
        {
          "name": "DSA-2233",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2233"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2939",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20090918 Insecure pid directory permissions for postfix on Debian / Ubuntu",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/09/18/6"
            },
            {
              "name": "DSA-2233",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2233"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2939",
    "datePublished": "2009-09-21T19:00:00",
    "dateReserved": "2009-08-23T00:00:00",
    "dateUpdated": "2024-08-07T06:07:37.330Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0411 (GCVE-0-2011-0411)
Vulnerability from cvelistv5
Published
2011-03-16 22:00
Modified
2024-08-06 21:51
Severity ?
CWE
  • n/a
Summary
The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
References
http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/65932 vdb-entry, x_refsource_XF
http://www.postfix.org/CVE-2011-0411.html x_refsource_CONFIRM
http://secunia.com/advisories/43646 third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html vendor-advisory, x_refsource_SUSE
http://www.osvdb.org/71021 vdb-entry, x_refsource_OSVDB
http://www.vupen.com/english/advisories/2011/0752 vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0891 vdb-entry, x_refsource_VUPEN
http://security.gentoo.org/glsa/glsa-201206-33.xml vendor-advisory, x_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056560.html vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/43874 third-party-advisory, x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056559.html vendor-advisory, x_refsource_FEDORA
http://www.kb.cert.org/vuls/id/MORO-8ELH6Z x_refsource_CONFIRM
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html vendor-advisory, x_refsource_APPLE
http://www.vupen.com/english/advisories/2011/0611 vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/46767 vdb-entry, x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2011-0423.html vendor-advisory, x_refsource_REDHAT
http://www.kb.cert.org/vuls/id/555316 third-party-advisory, x_refsource_CERT-VN
http://securitytracker.com/id?1025179 vdb-entry, x_refsource_SECTRACK
http://www.redhat.com/support/errata/RHSA-2011-0422.html vendor-advisory, x_refsource_REDHAT
http://support.apple.com/kb/HT5002 x_refsource_CONFIRM
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 x_refsource_CONFIRM
http://www.debian.org/security/2011/dsa-2233 vendor-advisory, x_refsource_DEBIAN
http://www.openwall.com/lists/oss-security/2021/08/10/2 mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.944Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"
          },
          {
            "name": "multiple-starttls-command-execution(65932)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65932"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.postfix.org/CVE-2011-0411.html"
          },
          {
            "name": "43646",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43646"
          },
          {
            "name": "SUSE-SR:2011:009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
          },
          {
            "name": "71021",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/71021"
          },
          {
            "name": "ADV-2011-0752",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0752"
          },
          {
            "name": "ADV-2011-0891",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0891"
          },
          {
            "name": "GLSA-201206-33",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
          },
          {
            "name": "FEDORA-2011-3355",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056560.html"
          },
          {
            "name": "43874",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43874"
          },
          {
            "name": "FEDORA-2011-3394",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056559.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MORO-8ELH6Z"
          },
          {
            "name": "APPLE-SA-2011-10-12-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
          },
          {
            "name": "ADV-2011-0611",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0611"
          },
          {
            "name": "46767",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46767"
          },
          {
            "name": "RHSA-2011:0423",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0423.html"
          },
          {
            "name": "VU#555316",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/555316"
          },
          {
            "name": "1025179",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1025179"
          },
          {
            "name": "RHSA-2011:0422",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0422.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5002"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
          },
          {
            "name": "DSA-2233",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2233"
          },
          {
            "name": "[oss-security] 20210810 STARTTLS vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/08/10/2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a \"plaintext command injection\" attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-08-10T11:07:06",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"
        },
        {
          "name": "multiple-starttls-command-execution(65932)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65932"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.postfix.org/CVE-2011-0411.html"
        },
        {
          "name": "43646",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43646"
        },
        {
          "name": "SUSE-SR:2011:009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
        },
        {
          "name": "71021",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/71021"
        },
        {
          "name": "ADV-2011-0752",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0752"
        },
        {
          "name": "ADV-2011-0891",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0891"
        },
        {
          "name": "GLSA-201206-33",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
        },
        {
          "name": "FEDORA-2011-3355",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056560.html"
        },
        {
          "name": "43874",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43874"
        },
        {
          "name": "FEDORA-2011-3394",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056559.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MORO-8ELH6Z"
        },
        {
          "name": "APPLE-SA-2011-10-12-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
        },
        {
          "name": "ADV-2011-0611",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0611"
        },
        {
          "name": "46767",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46767"
        },
        {
          "name": "RHSA-2011:0423",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0423.html"
        },
        {
          "name": "VU#555316",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/555316"
        },
        {
          "name": "1025179",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1025179"
        },
        {
          "name": "RHSA-2011:0422",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0422.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5002"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
        },
        {
          "name": "DSA-2233",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2233"
        },
        {
          "name": "[oss-security] 20210810 STARTTLS vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/08/10/2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2011-0411",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a \"plaintext command injection\" attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"
            },
            {
              "name": "multiple-starttls-command-execution(65932)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65932"
            },
            {
              "name": "http://www.postfix.org/CVE-2011-0411.html",
              "refsource": "CONFIRM",
              "url": "http://www.postfix.org/CVE-2011-0411.html"
            },
            {
              "name": "43646",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43646"
            },
            {
              "name": "SUSE-SR:2011:009",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
            },
            {
              "name": "71021",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/71021"
            },
            {
              "name": "ADV-2011-0752",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0752"
            },
            {
              "name": "ADV-2011-0891",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0891"
            },
            {
              "name": "GLSA-201206-33",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
            },
            {
              "name": "FEDORA-2011-3355",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056560.html"
            },
            {
              "name": "43874",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43874"
            },
            {
              "name": "FEDORA-2011-3394",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056559.html"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MORO-8ELH6Z",
              "refsource": "CONFIRM",
              "url": "http://www.kb.cert.org/vuls/id/MORO-8ELH6Z"
            },
            {
              "name": "APPLE-SA-2011-10-12-3",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
            },
            {
              "name": "ADV-2011-0611",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0611"
            },
            {
              "name": "46767",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46767"
            },
            {
              "name": "RHSA-2011:0423",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0423.html"
            },
            {
              "name": "VU#555316",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/555316"
            },
            {
              "name": "1025179",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1025179"
            },
            {
              "name": "RHSA-2011:0422",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0422.html"
            },
            {
              "name": "http://support.apple.com/kb/HT5002",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT5002"
            },
            {
              "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
              "refsource": "CONFIRM",
              "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
            },
            {
              "name": "DSA-2233",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2233"
            },
            {
              "name": "[oss-security] 20210810 STARTTLS vulnerabilities",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/08/10/2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2011-0411",
    "datePublished": "2011-03-16T22:00:00",
    "dateReserved": "2011-01-11T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.944Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1720 (GCVE-0-2011-1720)
Vulnerability from cvelistv5
Published
2011-05-13 17:00
Modified
2024-08-06 22:37
Severity ?
CWE
  • n/a
Summary
The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.642Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.postfix.org/CVE-2011-1720.html"
          },
          {
            "name": "44500",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44500"
          },
          {
            "name": "47778",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47778"
          },
          {
            "name": "GLSA-201206-33",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
          },
          {
            "name": "72259",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/72259"
          },
          {
            "name": "VU#727230",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/727230"
          },
          {
            "name": "1025521",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025521"
          },
          {
            "name": "[postfix-announce] 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
          },
          {
            "name": "8247",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8247"
          },
          {
            "name": "SUSE-SA:2011:023",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
          },
          {
            "name": "MDVSA-2011:090",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
          },
          {
            "name": "DSA-2233",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2233"
          },
          {
            "name": "USN-1131-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-1131-1"
          },
          {
            "name": "postfix-cyrus-sasl-code-exec(67359)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-05-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.postfix.org/CVE-2011-1720.html"
        },
        {
          "name": "44500",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44500"
        },
        {
          "name": "47778",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47778"
        },
        {
          "name": "GLSA-201206-33",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
        },
        {
          "name": "72259",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/72259"
        },
        {
          "name": "VU#727230",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/727230"
        },
        {
          "name": "1025521",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025521"
        },
        {
          "name": "[postfix-announce] 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
        },
        {
          "name": "8247",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8247"
        },
        {
          "name": "SUSE-SA:2011:023",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
        },
        {
          "name": "MDVSA-2011:090",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
        },
        {
          "name": "DSA-2233",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2233"
        },
        {
          "name": "USN-1131-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-1131-1"
        },
        {
          "name": "postfix-cyrus-sasl-code-exec(67359)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1720",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
            },
            {
              "name": "http://www.postfix.org/CVE-2011-1720.html",
              "refsource": "CONFIRM",
              "url": "http://www.postfix.org/CVE-2011-1720.html"
            },
            {
              "name": "44500",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44500"
            },
            {
              "name": "47778",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47778"
            },
            {
              "name": "GLSA-201206-33",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
            },
            {
              "name": "72259",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/72259"
            },
            {
              "name": "VU#727230",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/727230"
            },
            {
              "name": "1025521",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025521"
            },
            {
              "name": "[postfix-announce] 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
              "refsource": "MLIST",
              "url": "http://www.mail-archive.com/postfix-announce@postfix.org/msg00007.html"
            },
            {
              "name": "http://www.postfix.org/announcements/postfix-2.8.3.html",
              "refsource": "CONFIRM",
              "url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
            },
            {
              "name": "8247",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/8247"
            },
            {
              "name": "SUSE-SA:2011:023",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=699035",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
            },
            {
              "name": "MDVSA-2011:090",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
            },
            {
              "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
              "refsource": "CONFIRM",
              "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
            },
            {
              "name": "DSA-2233",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2233"
            },
            {
              "name": "USN-1131-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-1131-1"
            },
            {
              "name": "postfix-cyrus-sasl-code-exec(67359)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1720",
    "datePublished": "2011-05-13T17:00:00",
    "dateReserved": "2011-04-18T00:00:00",
    "dateUpdated": "2024-08-06T22:37:25.642Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-4977 (GCVE-0-2008-4977)
Vulnerability from cvelistv5
Published
2008-11-06 11:00
Modified
2024-09-17 00:50
Severity ?
CWE
  • n/a
Summary
postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files. NOTE: the vendor disputes this vulnerability, stating "This is not a real issue ... users would have to edit a script under /usr/lib to enable it.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:31:28.331Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://dev.gentoo.org/~rbu/security/debiantemp/postfix"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/496401"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugs.gentoo.org/show_bug.cgi?id=235811"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files.  NOTE: the vendor disputes this vulnerability, stating \"This is not a real issue ... users would have to edit a script under /usr/lib to enable it."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-06T11:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://dev.gentoo.org/~rbu/security/debiantemp/postfix"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/496401"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugs.gentoo.org/show_bug.cgi?id=235811"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4977",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED **  postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files.  NOTE: the vendor disputes this vulnerability, stating \"This is not a real issue ... users would have to edit a script under /usr/lib to enable it.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
            },
            {
              "name": "https://bugs.gentoo.org/show_bug.cgi?id=235770",
              "refsource": "MISC",
              "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
            },
            {
              "name": "http://dev.gentoo.org/~rbu/security/debiantemp/postfix",
              "refsource": "MISC",
              "url": "http://dev.gentoo.org/~rbu/security/debiantemp/postfix"
            },
            {
              "name": "http://bugs.debian.org/496401",
              "refsource": "MISC",
              "url": "http://bugs.debian.org/496401"
            },
            {
              "name": "https://bugs.gentoo.org/show_bug.cgi?id=235811",
              "refsource": "MISC",
              "url": "https://bugs.gentoo.org/show_bug.cgi?id=235811"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4977",
    "datePublished": "2008-11-06T11:00:00Z",
    "dateReserved": "2008-11-06T00:00:00Z",
    "dateUpdated": "2024-09-17T00:50:31.809Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-3889 (GCVE-0-2008-3889)
Vulnerability from cvelistv5
Published
2008-09-12 16:00
Modified
2024-08-07 09:53
Severity ?
CWE
  • n/a
Summary
Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file.
References
http://secunia.com/advisories/31986 third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/32231 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/496420/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/31982 third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-642-1 vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/30977 vdb-entry, x_refsource_BID
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/31800 third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/44865 vdb-entry, x_refsource_XF
http://securityreason.com/securityalert/4239 third-party-advisory, x_refsource_SREASON
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html vendor-advisory, x_refsource_SUSE
http://security.gentoo.org/glsa/glsa-200809-09.xml vendor-advisory, x_refsource_GENTOO
http://www.wekk.net/research/CVE-2008-3889/ x_refsource_MISC
http://secunia.com/advisories/31716 third-party-advisory, x_refsource_SECUNIA
https://www.exploit-db.com/exploits/6472 exploit, x_refsource_EXPLOIT-DB
http://www.mandriva.com/security/advisories?name=MDVSA-2008:190 vendor-advisory, x_refsource_MANDRIVA
http://securitytracker.com/id?1020800 vdb-entry, x_refsource_SECTRACK
http://www.postfix.org/announcements/20080902.html x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/498037/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/495894/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0311 x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:53:00.615Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "31986",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31986"
          },
          {
            "name": "FEDORA-2008-8595",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
          },
          {
            "name": "32231",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32231"
          },
          {
            "name": "20080916 [Suspected Spam][CVE-2008-4042] Postfix Linux-only local denial of service - PoC",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/496420/100/0/threaded"
          },
          {
            "name": "31982",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31982"
          },
          {
            "name": "USN-642-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-642-1"
          },
          {
            "name": "30977",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30977"
          },
          {
            "name": "FEDORA-2008-8593",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
          },
          {
            "name": "31800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31800"
          },
          {
            "name": "postfix-filedescriptor-dos(44865)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44865"
          },
          {
            "name": "4239",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4239"
          },
          {
            "name": "SUSE-SR:2008:018",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
          },
          {
            "name": "GLSA-200809-09",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200809-09.xml"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.wekk.net/research/CVE-2008-3889/"
          },
          {
            "name": "31716",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31716"
          },
          {
            "name": "6472",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6472"
          },
          {
            "name": "MDVSA-2008:190",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:190"
          },
          {
            "name": "1020800",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1020800"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.postfix.org/announcements/20080902.html"
          },
          {
            "name": "20081104 rPSA-2008-0311-1 postfix",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/498037/100/0/threaded"
          },
          {
            "name": "20080902 Postfix Linux-only local denial of service",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/495894/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0311"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-09-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of \"non-Postfix\" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "31986",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31986"
        },
        {
          "name": "FEDORA-2008-8595",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
        },
        {
          "name": "32231",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32231"
        },
        {
          "name": "20080916 [Suspected Spam][CVE-2008-4042] Postfix Linux-only local denial of service - PoC",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/496420/100/0/threaded"
        },
        {
          "name": "31982",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31982"
        },
        {
          "name": "USN-642-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-642-1"
        },
        {
          "name": "30977",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30977"
        },
        {
          "name": "FEDORA-2008-8593",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
        },
        {
          "name": "31800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31800"
        },
        {
          "name": "postfix-filedescriptor-dos(44865)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44865"
        },
        {
          "name": "4239",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4239"
        },
        {
          "name": "SUSE-SR:2008:018",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
        },
        {
          "name": "GLSA-200809-09",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200809-09.xml"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.wekk.net/research/CVE-2008-3889/"
        },
        {
          "name": "31716",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31716"
        },
        {
          "name": "6472",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6472"
        },
        {
          "name": "MDVSA-2008:190",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:190"
        },
        {
          "name": "1020800",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1020800"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.postfix.org/announcements/20080902.html"
        },
        {
          "name": "20081104 rPSA-2008-0311-1 postfix",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/498037/100/0/threaded"
        },
        {
          "name": "20080902 Postfix Linux-only local denial of service",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/495894/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0311"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3889",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of \"non-Postfix\" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "31986",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31986"
            },
            {
              "name": "FEDORA-2008-8595",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
            },
            {
              "name": "32231",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32231"
            },
            {
              "name": "20080916 [Suspected Spam][CVE-2008-4042] Postfix Linux-only local denial of service - PoC",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/496420/100/0/threaded"
            },
            {
              "name": "31982",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31982"
            },
            {
              "name": "USN-642-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-642-1"
            },
            {
              "name": "30977",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30977"
            },
            {
              "name": "FEDORA-2008-8593",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
            },
            {
              "name": "31800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31800"
            },
            {
              "name": "postfix-filedescriptor-dos(44865)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44865"
            },
            {
              "name": "4239",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4239"
            },
            {
              "name": "SUSE-SR:2008:018",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
            },
            {
              "name": "GLSA-200809-09",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200809-09.xml"
            },
            {
              "name": "http://www.wekk.net/research/CVE-2008-3889/",
              "refsource": "MISC",
              "url": "http://www.wekk.net/research/CVE-2008-3889/"
            },
            {
              "name": "31716",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31716"
            },
            {
              "name": "6472",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6472"
            },
            {
              "name": "MDVSA-2008:190",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:190"
            },
            {
              "name": "1020800",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1020800"
            },
            {
              "name": "http://www.postfix.org/announcements/20080902.html",
              "refsource": "CONFIRM",
              "url": "http://www.postfix.org/announcements/20080902.html"
            },
            {
              "name": "20081104 rPSA-2008-0311-1 postfix",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/498037/100/0/threaded"
            },
            {
              "name": "20080902 Postfix Linux-only local denial of service",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/495894/100/0/threaded"
            },
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0311",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0311"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3889",
    "datePublished": "2008-09-12T16:00:00",
    "dateReserved": "2008-09-02T00:00:00",
    "dateUpdated": "2024-08-07T09:53:00.615Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2020-04-24 12:15
Modified
2024-11-21 04:59
Summary
A certain Postfix 2.10.1-7 package could allow an attacker to send an email from an arbitrary-looking sender via a homoglyph attack, as demonstrated by the similarity of \xce\xbf to the 'o' character. This is potentially relevant when the /etc/postfix/sender_login feature is used, because a spoofed outbound message that uses a configured sender address is blocked with a "Sender address rejected: not logged in" error message, but a spoofed outbound message that uses a homoglyph of a configured sender address is not blocked. NOTE: some third parties argue that any missed blocking of spoofed outbound messages - except for exact matches to a sender address in the /etc/postfix/sender_login file - is outside the design goals of Postfix and thus cannot be considered a Postfix vulnerability
Impacted products
Vendor Product Version
postfix postfix 2.10.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C851CA35-20A6-4D1E-8473-7FDFBB2F633B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "A certain Postfix 2.10.1-7 package could allow an attacker to send an email from an arbitrary-looking sender via a homoglyph attack, as demonstrated by the similarity of \\xce\\xbf to the \u0027o\u0027 character. This is potentially relevant when the /etc/postfix/sender_login feature is used, because a spoofed outbound message that uses a configured sender address is blocked with a \"Sender address rejected: not logged in\" error message, but a spoofed outbound message that uses a homoglyph of a configured sender address is not blocked. NOTE: some third parties argue that any missed blocking of spoofed outbound messages - except for exact matches to a sender address in the /etc/postfix/sender_login file - is outside the design goals of Postfix and thus cannot be considered a Postfix vulnerability"
    },
    {
      "lang": "es",
      "value": "** EN DISPUTA ** Un determinado paquete Postfix versi\u00f3n 2.10.1-7,  podr\u00eda permitir a un atacante enviar un correo electr\u00f3nico desde un remitente de aspecto arbitrario por medio de un ataque de Homoglifo, como es demostrado por la similitud de \\xce\\xbf con el car\u00e1cter \"o\". Esto es potencialmente relevante cuando es usada la funcionalidad /etc/postfix/sender_login, porque un mensaje saliente falso que usa una direcci\u00f3n de remitente configurada es bloqueado con un mensaje de error \"Sender address rejected: not logged in\", pero un mensaje saliente falso que usa un homoglifo de una direcci\u00f3n de remitente configurada no es bloqueado. NOTA: Algunos terceros sostienen que cualquier bloqueo omitido de mensajes salientes falsos - excepto por coincidencias exactas con una direcci\u00f3n del remitente en el archivo de /etc/postfix/sender_login - est\u00e1 fuera de los objetivos de dise\u00f1o de Postfix y, por lo tanto, no puede ser considerada una vulnerabilidad de Postfix."
    }
  ],
  "id": "CVE-2020-12063",
  "lastModified": "2024-11-21T04:59:12.257",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-04-24T12:15:12.877",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2020/04/23/12"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2020/04/23/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2020/04/23/12"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2020/04/23/3"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-08-18 19:41
Modified
2025-04-09 00:30
Severity ?
Summary
Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.
References
secalert@redhat.comftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY
secalert@redhat.comftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY
secalert@redhat.comhttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html
secalert@redhat.comhttp://secunia.com/advisories/31477
secalert@redhat.comhttp://secunia.com/advisories/31485Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/31500Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/32231
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200808-12.xml
secalert@redhat.comhttp://wiki.rpath.com/Advisories:rPSA-2008-0259
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:224
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-0422.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/495632/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/30691Patch
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/2385
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/44461
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-2689
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31477
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31485Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31500Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32231
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200808-12.xml
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/Advisories:rPSA-2008-0259
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:224
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0422.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/495632/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30691Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2385
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44461
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2689
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html
Impacted products
Vendor Product Version
postfix postfix 2.5.0
postfix postfix 2.5.1
postfix postfix 2.5.2
postfix postfix 2.5.3
postfix postfix 2.6.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA31260C-1C67-4E76-9F56-2359BFA0B197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F1FC50-B6EB-48FD-A2FA-B8BEB05719DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1DE90BD-B5F9-4762-B086-130AB04F3CB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCD5258B-C9DE-47BD-9172-27618F220201",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B3F710-13EF-4A36-B191-E0FCC1D98E23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user\u0027s account name."
    },
    {
      "lang": "es",
      "value": "Postfix 2.5 anterior a 2.5.4 y 2.6 anterior a 2.6-20080814 env\u00eda a un archivo buz\u00f3n incluso cuando este archivo no es propiedad del receptor, lo que permite a usuarios locales leer mensajes de correo creando un archivo buz\u00f3n correspondiente con el nombre de cuenta de otro usuario."
    }
  ],
  "evaluatorComment": "Please refer to the following links for additional version information (vendor release notes):\r\n\r\nPostfix 2.5 - ftp://mirrors.loonybin.net/pub/postfix/official/postfix-2.5.4.RELEASE_NOTES\r\n\r\nPostfix 2.6 - ftp://mirrors.loonybin.net/pub/postfix/experimental/postfix-2.6-20080814.RELEASE_NOTES",
  "id": "CVE-2008-2937",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 1.9,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-08-18T19:41:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY"
    },
    {
      "source": "secalert@redhat.com",
      "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31477"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31485"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31500"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/32231"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200808-12.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0259"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:224"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0422.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/495632/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/30691"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/2385"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44461"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-2689"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31477"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31485"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31500"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32231"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200808-12.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0259"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:224"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0422.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/495632/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/30691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2385"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2689"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=456347\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/",
      "lastModified": "2008-08-19T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-05-13 17:05
Modified
2025-04-11 00:51
Severity ?
Summary
The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
References
cve@mitre.orghttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html
cve@mitre.orghttp://secunia.com/advisories/44500Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-201206-33.xml
cve@mitre.orghttp://securityreason.com/securityalert/8247
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2233
cve@mitre.orghttp://www.kb.cert.org/vuls/id/727230US Government Resource
cve@mitre.orghttp://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:090
cve@mitre.orghttp://www.osvdb.org/72259
cve@mitre.orghttp://www.postfix.org/CVE-2011-1720.htmlVendor Advisory
cve@mitre.orghttp://www.postfix.org/announcements/postfix-2.8.3.htmlVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/517917/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/47778Patch
cve@mitre.orghttp://www.securitytracker.com/id?1025521
cve@mitre.orghttp://www.ubuntu.com/usn/usn-1131-1
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=699035
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/67359
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44500Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201206-33.xml
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/8247
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2233
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/727230US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:090
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/72259
af854a3a-2127-422b-91ae-364da2661108http://www.postfix.org/CVE-2011-1720.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.postfix.org/announcements/postfix-2.8.3.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/517917/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/47778Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025521
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-1131-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=699035
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/67359
Impacted products
Vendor Product Version
postfix postfix 2.0.0
postfix postfix 2.0.1
postfix postfix 2.0.2
postfix postfix 2.0.3
postfix postfix 2.0.4
postfix postfix 2.0.5
postfix postfix 2.0.6
postfix postfix 2.0.7
postfix postfix 2.0.8
postfix postfix 2.0.9
postfix postfix 2.0.10
postfix postfix 2.0.11
postfix postfix 2.0.12
postfix postfix 2.0.13
postfix postfix 2.0.14
postfix postfix 2.0.15
postfix postfix 2.0.16
postfix postfix 2.0.17
postfix postfix 2.0.18
postfix postfix 2.0.19
postfix postfix 2.1.0
postfix postfix 2.1.1
postfix postfix 2.1.2
postfix postfix 2.1.3
postfix postfix 2.1.4
postfix postfix 2.1.5
postfix postfix 2.1.6
postfix postfix 2.2.0
postfix postfix 2.2.1
postfix postfix 2.2.2
postfix postfix 2.2.3
postfix postfix 2.2.4
postfix postfix 2.2.5
postfix postfix 2.2.6
postfix postfix 2.2.7
postfix postfix 2.2.8
postfix postfix 2.2.9
postfix postfix 2.2.10
postfix postfix 2.2.11
postfix postfix 2.2.12
postfix postfix 2.3
postfix postfix 2.3.0
postfix postfix 2.3.1
postfix postfix 2.3.2
postfix postfix 2.3.3
postfix postfix 2.3.4
postfix postfix 2.3.5
postfix postfix 2.3.6
postfix postfix 2.3.7
postfix postfix 2.3.8
postfix postfix 2.3.9
postfix postfix 2.3.10
postfix postfix 2.3.11
postfix postfix 2.3.12
postfix postfix 2.3.13
postfix postfix 2.3.14
postfix postfix 2.3.15
postfix postfix 2.3.16
postfix postfix 2.3.17
postfix postfix 2.3.18
postfix postfix 2.3.19
postfix postfix 2.4
postfix postfix 2.4.0
postfix postfix 2.4.1
postfix postfix 2.4.2
postfix postfix 2.4.3
postfix postfix 2.4.4
postfix postfix 2.4.5
postfix postfix 2.4.6
postfix postfix 2.4.7
postfix postfix 2.4.8
postfix postfix 2.4.9
postfix postfix 2.4.10
postfix postfix 2.4.11
postfix postfix 2.4.12
postfix postfix 2.4.13
postfix postfix 2.4.14
postfix postfix 2.4.15
postfix postfix 2.5.0
postfix postfix 2.5.1
postfix postfix 2.5.2
postfix postfix 2.5.3
postfix postfix 2.5.4
postfix postfix 2.5.5
postfix postfix 2.5.6
postfix postfix 2.5.7
postfix postfix 2.5.8
postfix postfix 2.5.9
postfix postfix 2.5.10
postfix postfix 2.5.11
postfix postfix 2.5.12
postfix postfix 2.6
postfix postfix 2.6.0
postfix postfix 2.6.1
postfix postfix 2.6.2
postfix postfix 2.6.3
postfix postfix 2.6.4
postfix postfix 2.6.5
postfix postfix 2.6.6
postfix postfix 2.6.7
postfix postfix 2.6.8
postfix postfix 2.6.9
postfix postfix 2.7.0
postfix postfix 2.7.1
postfix postfix 2.7.2
postfix postfix 2.7.3
postfix postfix 2.8.0
postfix postfix 2.8.1
postfix postfix 2.8.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB5D16A3-59DA-407B-82E4-65C39EBD3710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5DF3A2-5F47-4D2A-802B-CE53872DDEFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7A4BE9-7CBE-404F-B577-933AC26E6E81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8872C496-2430-4EA6-B417-51C6877B874A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB9646BA-E57D-4E1D-BF1A-FA137CA00ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "66B95D87-5B0B-48F6-8379-2521CFDE7CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A09799F5-6084-4F06-B851-4FEA7873BF35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9230082E-FE88-4001-A614-43E8DD76471B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "258010A6-6B75-4663-AD5C-E7AD48B38DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "602E668A-1343-457B-B0E1-CAB3CCA05BD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "83C3C7F7-016F-458B-B40D-E06080552045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE51A934-BFD2-4E61-9827-A934995BDCAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDF57DB8-3D17-4868-9FDF-81A0645FBC5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BDE9CC6-A7C7-4B0E-A341-E441EF9C33FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D7ECFA4-01CF-4C44-949D-7781767B724A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "A568A8FC-7BB0-431B-8BFE-1BF28DD545B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2273956-8CEB-439E-8841-953580AE673D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E074865-92E2-4AFC-8542-00273FDFACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1274628A-B6F8-48DA-A7B0-7629362A0383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FAE9B3D-C867-4100-9F1A-1A925E6BCA2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "123ED520-D9A9-457E-B0FF-2164678F2FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F03CC36-4E01-4298-8BF2-208EC2126E2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA763611-3C94-40EB-AC16-F6860FCBFDAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8725859-159E-49A5-91F2-12A6B300AE76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D3B5347-F7FD-4291-8535-9D71F9F49568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2750F62-79D5-41ED-8624-4DC36A23A03D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1D09CC9-07C8-42C7-B7B2-25251C8615A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28A5B6A-466B-4B24-9BD4-9DE15642A724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8E7B624-C991-4EA1-A977-6C06F57B4E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E899C1C0-18D1-43DE-BC55-C3C14F5395D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "05F2CA7C-1BCE-4EBB-BFAA-6C27F03CAC9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "903BF741-FD7E-41F7-802D-88A09B7EFFFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0A444A-E6FE-4585-BA6C-6061A87C6144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "161082B7-A757-496C-9D35-681851CEA10B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02E2034-BB39-4B86-81CA-3BB93A4E4849",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CF0FA6-F4F6-4A4B-89A6-057F835FFE89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0055B0EA-775F-4670-A3F9-C1676DBB97D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "363704AE-66A9-4B58-A57E-47748F299471",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5226F933-9FB6-4BF6-AC3B-1A22D22F92F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0066AE84-D27D-4E9B-851B-40EDFD07C0BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B739C7B-93CC-4367-B006-E8A721ECBCF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08A3C19-AEB6-4E0C-A41D-01024DC0A25D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAE8A81E-3856-4908-B7B7-9CF511CA2A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B935272-1EC7-4C70-8299-9DC7594809EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1647690F-D015-4DC4-9FB7-F5E9F0C430D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A814997B-A612-493F-AA85-BA5A187A91FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "449E9764-54F4-46F9-9E4D-F2C96EC5F37E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4A15A5-0994-4A3B-B4CD-1C5D9F411FDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E3FB858-1B20-450B-9181-A1FE1C2B9DB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6BBD449-6F03-4EFE-8C87-B5014F0381F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBD42EA-B31E-4E37-BF28-FEBB18369A18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B92BCC42-6E9F-44CB-A755-004B6DBD9D41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B67A4AE-2C1C-49D6-9F53-05CAB51273E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A64D948-9441-492F-B9E5-DE5D5A3D7266",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7BCB67-AF9E-4343-827B-D783C71BAF46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "265AD494-E5EB-423B-9C20-62BCB1C3B9B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B63D1C8C-6E55-43B1-9479-5CE7A917C501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "208C73B6-88AF-4D8D-A7BE-8AB4E1A4F07B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11993437-8CE2-44A7-BEF8-D5F7410DCB52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "E13F9414-C71A-49A7-9A84-BC3151E95598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "546CC4D9-D2F4-4725-AD2D-200E6549BB63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "998D1069-1CF5-42C5-8668-49D72E2D2F17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2138A68-3F3D-4C7E-9FEB-2C8A445F2789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5E0EB5-ECC6-4573-9EA7-83E5741DA3CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "790C02A8-95DD-42BE-8A1C-1C6D6DDCC443",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0034F2-585D-4A98-8428-996A726712DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B162B5-DEF5-46AD-87D1-734B3B637D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DF3730A-0FFD-4C23-B758-BBA67CC9CD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "10E8E5E2-5674-40D5-AD86-8C4DDB442EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "690EDC73-47B5-4891-86A5-37B6ED80E145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B751BA4B-B7C8-4A87-A03C-5C91678FC832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "08943D31-2139-45D3-A0DB-0C11C31875CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "591FB74F-BD86-4314-A359-739A245D2642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2EF7B2-943F-4DFA-8249-7FC0F9FB0312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B3AFC1E-01FF-4F91-8C82-5C16378812C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E552B8-8B26-4DEE-BC6A-BC0B01C42474",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "66E26194-A7E6-4A99-8F55-7422A7E9BAB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58097735-FE3B-48B7-B5EA-3CD530E16031",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA31260C-1C67-4E76-9F56-2359BFA0B197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F1FC50-B6EB-48FD-A2FA-B8BEB05719DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1DE90BD-B5F9-4762-B086-130AB04F3CB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCD5258B-C9DE-47BD-9172-27618F220201",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC95B8DD-C8C6-4FC4-81A5-23D7669DA22A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "894002C8-F3C1-4241-96FE-C088BBD0FCED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C91BA7D1-2A5B-4721-8E13-6520D6F0114B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBE79FBB-801F-4B1E-8FB8-CB2A1FAF6EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "253DB571-62B7-4015-A758-9DE55AAB8B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7AF9D8C-B11C-4681-84CE-5C86926C85F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "955FBDF4-5103-4B19-A5F1-9468F73C7A54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AAC0FF5-9699-4011-8C07-5DDAF13B64A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1262ECC9-7496-4D6B-880E-6CA85EE5CD46",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1E6461-2F2A-49C5-9B2B-08DE418F2F7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B3F710-13EF-4A36-B191-E0FCC1D98E23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFB5988E-D04B-43B9-A980-82FD44D1D198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1021E-587D-47D3-80E8-43D9CCB4BD72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC9B923-222D-4F7F-970C-0B9ADF4E86F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D31B75AE-FF82-4B70-BDEC-4B0FA791A085",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C148A9D5-8899-4956-BE45-C4DBD4A2BE08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "558A2B97-6582-445F-991C-4DD530E991DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "56509587-6CE6-4497-B571-0A014E1FE064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B24CEB4-4F57-46CB-990B-AB664CEC96EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E40EEF8-F075-4B87-BDE7-C2D1A39B2F80",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5044BFB-4F00-4FFC-9A66-2FDC666B6C2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "827897F6-2A24-45EC-A072-8C02BA726069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A3CFD6A-86E2-4E7B-BAC2-3163FC7DBF17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7705A10C-0BA3-4F04-B757-5890B6A2A860",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "133B8398-2495-47CD-B140-5247ECE86EE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D14612B0-7F74-4ED6-89F9-A11ED75A577F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F5C105E-B22B-48B4-8DC8-5B747792C102",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method."
    },
    {
      "lang": "es",
      "value": "El servidor SMTP en Postfix anterior a v2.5.13, v2.6.x anterior a v2.6.10, v2.7.x anterior a v2.7.4, y v2.8.x anterior a v2.8.3, cuando ciertos m\u00e9todos Cyrus SASL de autenticaci\u00f3n son activados, no crea un nuevo manejador de servidor despu\u00e9s de que la autentificaci\u00f3n falle, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria libre y ca\u00edda de demonio) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a tra\u00b4ves de un comando AUTH no v\u00e1lido con un m\u00e9todo seguido por un comando AUTH con un m\u00e9todo diferente."
    }
  ],
  "id": "CVE-2011-1720",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-05-13T17:05:43.207",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44500"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/8247"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2233"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/727230"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/72259"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.postfix.org/CVE-2011-1720.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/47778"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1025521"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-1131-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44500"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/8247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/727230"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/72259"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.postfix.org/CVE-2011-1720.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/47778"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025521"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-1131-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-11-06 15:55
Modified
2025-04-09 00:30
Severity ?
Summary
postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files. NOTE: the vendor disputes this vulnerability, stating "This is not a real issue ... users would have to edit a script under /usr/lib to enable it.
Impacted products
Vendor Product Version
postfix postfix 2.5.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1DE90BD-B5F9-4762-B086-130AB04F3CB0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files.  NOTE: the vendor disputes this vulnerability, stating \"This is not a real issue ... users would have to edit a script under /usr/lib to enable it."
    },
    {
      "lang": "es",
      "value": "** CUESTIONADA ** postfix_groups.pl en Postfix v2.5.2 permite a usuarios locales sobrescribir ficheros a su elecci\u00f3n a trav\u00e9s de un ataque de enlace simulado en los ficheros temporales (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, y (3) /tmp/postfix_groups.message. NOTA: El vendedor ha impugnado esta vulnerabilidad, argumentando que \"Este no es un problema real...los usuarios deber\u00edan realizar una secuencia de comandos bajo /usr/lib para poder hacerlo\"."
    }
  ],
  "id": "CVE-2008-4977",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-11-06T15:55:52.103",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/496401"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://dev.gentoo.org/~rbu/security/debiantemp/postfix"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugs.gentoo.org/show_bug.cgi?id=235811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/496401"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://dev.gentoo.org/~rbu/security/debiantemp/postfix"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugs.gentoo.org/show_bug.cgi?id=235811"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect the versions of postfix as shipped with Red Hat Enterprise Linux 3, 4, or 5. Mentioned script is not part of the official postfix distribution and is not included in Red Hat Enterprise Linux postfix packages.",
      "lastModified": "2008-11-06T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-09-12 16:56
Modified
2025-04-09 00:30
Severity ?
Summary
Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
cve@mitre.orghttp://secunia.com/advisories/31716Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31800
cve@mitre.orghttp://secunia.com/advisories/31982
cve@mitre.orghttp://secunia.com/advisories/31986
cve@mitre.orghttp://secunia.com/advisories/32231
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200809-09.xml
cve@mitre.orghttp://securityreason.com/securityalert/4239
cve@mitre.orghttp://securitytracker.com/id?1020800
cve@mitre.orghttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0311
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:190
cve@mitre.orghttp://www.postfix.org/announcements/20080902.htmlPatch
cve@mitre.orghttp://www.securityfocus.com/archive/1/495894/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/496420/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/498037/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/30977
cve@mitre.orghttp://www.ubuntu.com/usn/usn-642-1
cve@mitre.orghttp://www.wekk.net/research/CVE-2008-3889/
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44865
cve@mitre.orghttps://www.exploit-db.com/exploits/6472
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31716Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31800
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31982
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31986
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32231
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200809-09.xml
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/4239
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1020800
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0311
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:190
af854a3a-2127-422b-91ae-364da2661108http://www.postfix.org/announcements/20080902.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/495894/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/496420/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/498037/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30977
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-642-1
af854a3a-2127-422b-91ae-364da2661108http://www.wekk.net/research/CVE-2008-3889/
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44865
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/6472
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FC560CC-F785-42D5-A25B-1BA02E7AC464",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "998D1069-1CF5-42C5-8668-49D72E2D2F17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2138A68-3F3D-4C7E-9FEB-2C8A445F2789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5E0EB5-ECC6-4573-9EA7-83E5741DA3CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "790C02A8-95DD-42BE-8A1C-1C6D6DDCC443",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0034F2-585D-4A98-8428-996A726712DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B162B5-DEF5-46AD-87D1-734B3B637D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DF3730A-0FFD-4C23-B758-BBA67CC9CD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "10E8E5E2-5674-40D5-AD86-8C4DDB442EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "690EDC73-47B5-4891-86A5-37B6ED80E145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B751BA4B-B7C8-4A87-A03C-5C91678FC832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F1FC50-B6EB-48FD-A2FA-B8BEB05719DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1DE90BD-B5F9-4762-B086-130AB04F3CB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCD5258B-C9DE-47BD-9172-27618F220201",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1E6461-2F2A-49C5-9B2B-08DE418F2F7B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of \"non-Postfix\" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file."
    },
    {
      "lang": "es",
      "value": "Postfix versi\u00f3n 2.4 anteriores a la 2.4.9, versi\u00f3n 2.5 anteriores a la 2.5.5 y versi\u00f3n 2.6 anteriores a la 2.6-2000902, cuando se utiliza con el nucleo de Linux versi\u00f3n 2.6, muestra los descriptores del fichero epoll durante la ejecuci\u00f3n de comandos que no son Postfix, permite a usuarios locales provocar una denegaci\u00f3n de servicio (aplicaci\u00f3n m\u00e1s lenta o finalizaci\u00f3n) mediante un comando especialmente construido, como se ha demostrado por un comando en un fichero .forward."
    }
  ],
  "id": "CVE-2008-3889",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-09-12T16:56:20.587",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31716"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31982"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31986"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/32231"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200809-09.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/4239"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1020800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0311"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:190"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.postfix.org/announcements/20080902.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/495894/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/496420/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/498037/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30977"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-642-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.wekk.net/research/CVE-2008-3889/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44865"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/6472"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31716"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31982"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31986"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32231"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200809-09.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/4239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1020800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0311"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.postfix.org/announcements/20080902.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/495894/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/496420/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/498037/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-642-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.wekk.net/research/CVE-2008-3889/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44865"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/6472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect the versions Postfix as shipped with Red Hat Enterprise Linux 3, 4, or 5.",
      "lastModified": "2017-09-28T21:31:54.147",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-04-16 17:29
Modified
2024-11-21 03:05
Summary
Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 might allow local users to gain privileges by leveraging undocumented functionality in Berkeley DB 2.x and later, related to reading settings from DB_CONFIG in the current directory.
Impacted products
Vendor Product Version
postfix postfix *
postfix postfix *
postfix postfix *
postfix postfix *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4E46DED-C952-4EC2-8418-B94092708565",
              "versionEndExcluding": "2.11.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5514620D-4D5B-4090-9462-13C7F6EC6FC1",
              "versionEndExcluding": "3.0.10",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBE1FAC6-6422-43D8-8981-08359639366B",
              "versionEndExcluding": "3.1.6",
              "versionStartIncluding": "3.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B5C3C4E-E289-4F5E-A211-A9EE33EDE36E",
              "versionEndExcluding": "3.2.2",
              "versionStartIncluding": "3.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 might allow local users to gain privileges by leveraging undocumented functionality in Berkeley DB 2.x and later, related to reading settings from DB_CONFIG in the current directory."
    },
    {
      "lang": "es",
      "value": "Postfix, en versiones anteriores a la 2.11.10, versiones 3.0.x anteriores a la 3.0.10, versiones 3.1.x anteriores a la 3.1.6 y versiones 3.2.x anteriores a la 3.2.2, podr\u00eda permitir que usuarios locales obtengan privilegios aprovechando una funcionalidad no documentada en Berkeley DB, en versiones 2.x y posteriores. Esto est\u00e1 relacionado con la lectura de opciones de DB_CONFIG en el directorio actual."
    }
  ],
  "id": "CVE-2017-10140",
  "lastModified": "2024-11-21T03:05:27.960",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-16T17:29:00.220",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/oss-sec/2017/q3/285"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.postfix.org/announcements/postfix-3.2.2.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2019:0366"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/oss-sec/2017/q3/285"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.postfix.org/announcements/postfix-3.2.2.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2019:0366"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-10-01 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23A80121-F089-4DE1-8086-7454D66E8FEA",
              "versionEndIncluding": "2.3.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB5D16A3-59DA-407B-82E4-65C39EBD3710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5DF3A2-5F47-4D2A-802B-CE53872DDEFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7A4BE9-7CBE-404F-B577-933AC26E6E81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8872C496-2430-4EA6-B417-51C6877B874A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB9646BA-E57D-4E1D-BF1A-FA137CA00ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "66B95D87-5B0B-48F6-8379-2521CFDE7CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A09799F5-6084-4F06-B851-4FEA7873BF35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9230082E-FE88-4001-A614-43E8DD76471B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "258010A6-6B75-4663-AD5C-E7AD48B38DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "602E668A-1343-457B-B0E1-CAB3CCA05BD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "83C3C7F7-016F-458B-B40D-E06080552045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE51A934-BFD2-4E61-9827-A934995BDCAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDF57DB8-3D17-4868-9FDF-81A0645FBC5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BDE9CC6-A7C7-4B0E-A341-E441EF9C33FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D7ECFA4-01CF-4C44-949D-7781767B724A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "A568A8FC-7BB0-431B-8BFE-1BF28DD545B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2273956-8CEB-439E-8841-953580AE673D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E074865-92E2-4AFC-8542-00273FDFACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1274628A-B6F8-48DA-A7B0-7629362A0383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FAE9B3D-C867-4100-9F1A-1A925E6BCA2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "123ED520-D9A9-457E-B0FF-2164678F2FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F03CC36-4E01-4298-8BF2-208EC2126E2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA763611-3C94-40EB-AC16-F6860FCBFDAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8725859-159E-49A5-91F2-12A6B300AE76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D3B5347-F7FD-4291-8535-9D71F9F49568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2750F62-79D5-41ED-8624-4DC36A23A03D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1D09CC9-07C8-42C7-B7B2-25251C8615A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28A5B6A-466B-4B24-9BD4-9DE15642A724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8E7B624-C991-4EA1-A977-6C06F57B4E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E899C1C0-18D1-43DE-BC55-C3C14F5395D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "05F2CA7C-1BCE-4EBB-BFAA-6C27F03CAC9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "903BF741-FD7E-41F7-802D-88A09B7EFFFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0A444A-E6FE-4585-BA6C-6061A87C6144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "161082B7-A757-496C-9D35-681851CEA10B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02E2034-BB39-4B86-81CA-3BB93A4E4849",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CF0FA6-F4F6-4A4B-89A6-057F835FFE89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0055B0EA-775F-4670-A3F9-C1676DBB97D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "363704AE-66A9-4B58-A57E-47748F299471",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5226F933-9FB6-4BF6-AC3B-1A22D22F92F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0066AE84-D27D-4E9B-851B-40EDFD07C0BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B739C7B-93CC-4367-B006-E8A721ECBCF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAE8A81E-3856-4908-B7B7-9CF511CA2A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B935272-1EC7-4C70-8299-9DC7594809EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1647690F-D015-4DC4-9FB7-F5E9F0C430D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Postfix Admin (tambi\u00e9n conocido como postfixadmin) anterior a 2.3.5 permiten a usuarios remotos autenticados ejecutar comandos SQL a trav\u00e9s de (1) el par\u00e1metro pw en la funci\u00f3n pacrypt, cuando mysql_encrypt est\u00e1 configurado, o (2) vectores no especificados que se utilizan en los ficheros de las copias de seguridad generados por backup.php."
    }
  ],
  "id": "CVE-2012-0811",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-10-01T14:55:10.120",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/01/26/5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/01/27/5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/51680"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/01/26/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/01/27/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-24 05:15
Modified
2024-11-21 08:38
Summary
Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/12/24/1Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/12/25/1Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2024/05/09/3
cve@mitre.orghttps://access.redhat.com/security/cve/CVE-2023-51764Third Party Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=2255563Issue Tracking, Third Party Advisory
cve@mitre.orghttps://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.htmlTechnical Description
cve@mitre.orghttps://github.com/duy-31/CVE-2023-51764Exploit, Third Party Advisory
cve@mitre.orghttps://github.com/eeenvik1/CVE-2023-51764Exploit, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2024/01/msg00020.html
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ5WXFCW2N6G2PH3JXDTYW5PH5EBQEGO/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRLF5SOS7TP5N7FQSEK2NFNB44ISVTZC/
cve@mitre.orghttps://lwn.net/Articles/956533/
cve@mitre.orghttps://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/Technical Description, Third Party Advisory
cve@mitre.orghttps://www.openwall.com/lists/oss-security/2024/01/22/1
cve@mitre.orghttps://www.postfix.org/announcements/postfix-3.8.5.html
cve@mitre.orghttps://www.postfix.org/smtp-smuggling.htmlExploit, Mitigation, Vendor Advisory
cve@mitre.orghttps://www.youtube.com/watch?v=V8KPV96g1ToExploit
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/12/24/1Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/12/25/1Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2024/05/09/3
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/cve/CVE-2023-51764Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=2255563Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.htmlTechnical Description
af854a3a-2127-422b-91ae-364da2661108https://github.com/duy-31/CVE-2023-51764Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/eeenvik1/CVE-2023-51764Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/01/msg00020.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ5WXFCW2N6G2PH3JXDTYW5PH5EBQEGO/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRLF5SOS7TP5N7FQSEK2NFNB44ISVTZC/
af854a3a-2127-422b-91ae-364da2661108https://lwn.net/Articles/956533/
af854a3a-2127-422b-91ae-364da2661108https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/Technical Description, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.openwall.com/lists/oss-security/2024/01/22/1
af854a3a-2127-422b-91ae-364da2661108https://www.postfix.org/announcements/postfix-3.8.5.html
af854a3a-2127-422b-91ae-364da2661108https://www.postfix.org/smtp-smuggling.htmlExploit, Mitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.youtube.com/watch?v=V8KPV96g1ToExploit



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0598FFA3-9DB8-4D01-9049-3834B6B53000",
              "versionEndExcluding": "3.5.23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD4364D-F93C-499E-8ECA-5228354D20B6",
              "versionEndExcluding": "3.6.13",
              "versionStartIncluding": "3.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7174307B-1249-47B5-BE66-9194AC26BA15",
              "versionEndExcluding": "3.7.9",
              "versionStartIncluding": "3.7.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A422C34-3E0E-4C3F-8EA9-4F442D88057D",
              "versionEndExcluding": "3.8.4",
              "versionStartIncluding": "3.8.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports \u003cLF\u003e.\u003cCR\u003e\u003cLF\u003e but some other popular e-mail servers do not. To prevent attack variants (by always disallowing \u003cLF\u003e without \u003cCR\u003e), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9."
    },
    {
      "lang": "es",
      "value": "Postfix hasta 3.8.4 permite el contrabando SMTP a menos que se configure con smtpd_data_restrictions=reject_unauth_pipelining (u otras opciones que existen en versiones recientes). Los atacantes remotos pueden utilizar una t\u00e9cnica de explotaci\u00f3n publicada para inyectar mensajes de correo electr\u00f3nico que parecen originarse en el servidor Postfix, lo que permite omitir un mecanismo de protecci\u00f3n SPF. Esto ocurre porque Postfix admite . pero algunos otros servidores de correo electr\u00f3nico populares no lo hacen. Para evitar variantes de ataque (al no permitir siempre  sin ), se requiere una soluci\u00f3n diferente: la opci\u00f3n smtpd_forbid_bare_newline=yes con una versi\u00f3n m\u00ednima de Postfix de 3.5.23, 3.6.13, 3.7.9, 3.8.4, o 3.9."
    }
  ],
  "id": "CVE-2023-51764",
  "lastModified": "2024-11-21T08:38:44.733",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-24T05:15:08.273",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/12/24/1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/12/25/1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2024/05/09/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-51764"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255563"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Technical Description"
      ],
      "url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/duy-31/CVE-2023-51764"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eeenvik1/CVE-2023-51764"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00020.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ5WXFCW2N6G2PH3JXDTYW5PH5EBQEGO/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRLF5SOS7TP5N7FQSEK2NFNB44ISVTZC/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lwn.net/Articles/956533/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.openwall.com/lists/oss-security/2024/01/22/1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.postfix.org/announcements/postfix-3.8.5.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.postfix.org/smtp-smuggling.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.youtube.com/watch?v=V8KPV96g1To"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/12/24/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/12/25/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2024/05/09/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-51764"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255563"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Technical Description"
      ],
      "url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/duy-31/CVE-2023-51764"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eeenvik1/CVE-2023-51764"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ5WXFCW2N6G2PH3JXDTYW5PH5EBQEGO/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRLF5SOS7TP5N7FQSEK2NFNB44ISVTZC/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lwn.net/Articles/956533/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.openwall.com/lists/oss-security/2024/01/22/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.postfix.org/announcements/postfix-3.8.5.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.postfix.org/smtp-smuggling.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.youtube.com/watch?v=V8KPV96g1To"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-345"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-03-16 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
References
cret@cert.orghttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
cret@cert.orghttp://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
cret@cert.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-March/056559.html
cret@cert.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-March/056560.html
cret@cert.orghttp://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
cret@cert.orghttp://secunia.com/advisories/43646Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/43874
cret@cert.orghttp://security.gentoo.org/glsa/glsa-201206-33.xml
cret@cert.orghttp://securitytracker.com/id?1025179
cret@cert.orghttp://support.apple.com/kb/HT5002
cret@cert.orghttp://www.debian.org/security/2011/dsa-2233
cret@cert.orghttp://www.kb.cert.org/vuls/id/555316US Government Resource
cret@cert.orghttp://www.kb.cert.org/vuls/id/MORO-8ELH6ZUS Government Resource
cret@cert.orghttp://www.openwall.com/lists/oss-security/2021/08/10/2
cret@cert.orghttp://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
cret@cert.orghttp://www.osvdb.org/71021
cret@cert.orghttp://www.postfix.org/CVE-2011-0411.htmlExploit, Vendor Advisory
cret@cert.orghttp://www.redhat.com/support/errata/RHSA-2011-0422.html
cret@cert.orghttp://www.redhat.com/support/errata/RHSA-2011-0423.html
cret@cert.orghttp://www.securityfocus.com/bid/46767
cret@cert.orghttp://www.vupen.com/english/advisories/2011/0611Vendor Advisory
cret@cert.orghttp://www.vupen.com/english/advisories/2011/0752
cret@cert.orghttp://www.vupen.com/english/advisories/2011/0891
cret@cert.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/65932
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056559.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056560.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43646Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43874
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201206-33.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1025179
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5002
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2233
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/555316US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/MORO-8ELH6ZUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2021/08/10/2
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/71021
af854a3a-2127-422b-91ae-364da2661108http://www.postfix.org/CVE-2011-0411.htmlExploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0422.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0423.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/46767
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0611Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0752
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0891
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/65932



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "998D1069-1CF5-42C5-8668-49D72E2D2F17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2138A68-3F3D-4C7E-9FEB-2C8A445F2789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5E0EB5-ECC6-4573-9EA7-83E5741DA3CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "790C02A8-95DD-42BE-8A1C-1C6D6DDCC443",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0034F2-585D-4A98-8428-996A726712DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B162B5-DEF5-46AD-87D1-734B3B637D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DF3730A-0FFD-4C23-B758-BBA67CC9CD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "10E8E5E2-5674-40D5-AD86-8C4DDB442EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "690EDC73-47B5-4891-86A5-37B6ED80E145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B751BA4B-B7C8-4A87-A03C-5C91678FC832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "08943D31-2139-45D3-A0DB-0C11C31875CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "591FB74F-BD86-4314-A359-739A245D2642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2EF7B2-943F-4DFA-8249-7FC0F9FB0312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B3AFC1E-01FF-4F91-8C82-5C16378812C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E552B8-8B26-4DEE-BC6A-BC0B01C42474",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "66E26194-A7E6-4A99-8F55-7422A7E9BAB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58097735-FE3B-48B7-B5EA-3CD530E16031",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA31260C-1C67-4E76-9F56-2359BFA0B197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F1FC50-B6EB-48FD-A2FA-B8BEB05719DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1DE90BD-B5F9-4762-B086-130AB04F3CB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCD5258B-C9DE-47BD-9172-27618F220201",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC95B8DD-C8C6-4FC4-81A5-23D7669DA22A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "894002C8-F3C1-4241-96FE-C088BBD0FCED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C91BA7D1-2A5B-4721-8E13-6520D6F0114B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBE79FBB-801F-4B1E-8FB8-CB2A1FAF6EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "253DB571-62B7-4015-A758-9DE55AAB8B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7AF9D8C-B11C-4681-84CE-5C86926C85F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "955FBDF4-5103-4B19-A5F1-9468F73C7A54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AAC0FF5-9699-4011-8C07-5DDAF13B64A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1E6461-2F2A-49C5-9B2B-08DE418F2F7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B3F710-13EF-4A36-B191-E0FCC1D98E23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFB5988E-D04B-43B9-A980-82FD44D1D198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A1021E-587D-47D3-80E8-43D9CCB4BD72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC9B923-222D-4F7F-970C-0B9ADF4E86F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D31B75AE-FF82-4B70-BDEC-4B0FA791A085",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C148A9D5-8899-4956-BE45-C4DBD4A2BE08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "558A2B97-6582-445F-991C-4DD530E991DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "56509587-6CE6-4497-B571-0A014E1FE064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B24CEB4-4F57-46CB-990B-AB664CEC96EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5044BFB-4F00-4FFC-9A66-2FDC666B6C2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "827897F6-2A24-45EC-A072-8C02BA726069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A3CFD6A-86E2-4E7B-BAC2-3163FC7DBF17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a \"plaintext command injection\" attack."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n de STARTTLS de Postfix 2.4.x anteriores a 2.4.16, 2.5.x anteriores a 2.5.12, 2.6.x anteriores a 2.6.9, y 2.7.x anteriores a 2.7.3 no restringe apropiadamente el buffering de I/O, lo que permite a atacantes man-in-the-middle insertar comandos en sesiones SMTP encriptadas enviando un comando en texto claro que es procesado despu\u00e9s de que TLS es iniciado. Relacionado con un ataque de \"inyecci\u00f3n de comandos de texto en claro\"."
    }
  ],
  "id": "CVE-2011-0411",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-03-16T22:55:02.717",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "cret@cert.org",
      "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056559.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056560.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43646"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/43874"
    },
    {
      "source": "cret@cert.org",
      "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
    },
    {
      "source": "cret@cert.org",
      "url": "http://securitytracker.com/id?1025179"
    },
    {
      "source": "cret@cert.org",
      "url": "http://support.apple.com/kb/HT5002"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.debian.org/security/2011/dsa-2233"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/555316"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MORO-8ELH6Z"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.openwall.com/lists/oss-security/2021/08/10/2"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.osvdb.org/71021"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.postfix.org/CVE-2011-0411.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0422.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0423.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/bid/46767"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0611"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2011/0752"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2011/0891"
    },
    {
      "source": "cret@cert.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056559.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056560.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43646"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/43874"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1025179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT5002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/555316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MORO-8ELH6Z"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2021/08/10/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/71021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.postfix.org/CVE-2011-0411.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0422.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0423.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46767"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0611"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0752"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0891"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65932"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-08-18 19:41
Modified
2025-04-09 00:30
Severity ?
Summary
Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
References
secalert@redhat.comftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY
secalert@redhat.comftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.3.15.HISTORY
secalert@redhat.comftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY
secalert@redhat.comftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY
secalert@redhat.comhttp://article.gmane.org/gmane.mail.postfix.announce/110
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html
secalert@redhat.comhttp://secunia.com/advisories/31469
secalert@redhat.comhttp://secunia.com/advisories/31474
secalert@redhat.comhttp://secunia.com/advisories/31477
secalert@redhat.comhttp://secunia.com/advisories/31485Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/31500Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/31530
secalert@redhat.comhttp://secunia.com/advisories/32231
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200808-12.xml
secalert@redhat.comhttp://securityreason.com/securityalert/4160
secalert@redhat.comhttp://wiki.rpath.com/Advisories:rPSA-2008-0259
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1629
secalert@redhat.comhttp://www.kb.cert.org/vuls/id/938323US Government Resource
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:171
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0839.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/495474/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/495632/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/495882/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/30691Patch
secalert@redhat.comhttp://www.securitytracker.com/id?1020700
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/2385
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/44460
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-2689
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10033
secalert@redhat.comhttps://usn.ubuntu.com/636-1/
secalert@redhat.comhttps://www.exploit-db.com/exploits/6337
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.3.15.HISTORY
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY
af854a3a-2127-422b-91ae-364da2661108http://article.gmane.org/gmane.mail.postfix.announce/110
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31469
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31474
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31477
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31485Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31500Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31530
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32231
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200808-12.xml
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/4160
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/Advisories:rPSA-2008-0259
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1629
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/938323US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:171
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0839.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/495474/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/495632/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/495882/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30691Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020700
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2385
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44460
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2689
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10033
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/636-1/
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/6337
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08A3C19-AEB6-4E0C-A41D-01024DC0A25D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAE8A81E-3856-4908-B7B7-9CF511CA2A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B935272-1EC7-4C70-8299-9DC7594809EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1647690F-D015-4DC4-9FB7-F5E9F0C430D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A814997B-A612-493F-AA85-BA5A187A91FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "449E9764-54F4-46F9-9E4D-F2C96EC5F37E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4A15A5-0994-4A3B-B4CD-1C5D9F411FDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E3FB858-1B20-450B-9181-A1FE1C2B9DB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6BBD449-6F03-4EFE-8C87-B5014F0381F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBD42EA-B31E-4E37-BF28-FEBB18369A18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B92BCC42-6E9F-44CB-A755-004B6DBD9D41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B67A4AE-2C1C-49D6-9F53-05CAB51273E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A64D948-9441-492F-B9E5-DE5D5A3D7266",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7BCB67-AF9E-4343-827B-D783C71BAF46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "265AD494-E5EB-423B-9C20-62BCB1C3B9B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2138A68-3F3D-4C7E-9FEB-2C8A445F2789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5E0EB5-ECC6-4573-9EA7-83E5741DA3CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "790C02A8-95DD-42BE-8A1C-1C6D6DDCC443",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0034F2-585D-4A98-8428-996A726712DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B162B5-DEF5-46AD-87D1-734B3B637D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DF3730A-0FFD-4C23-B758-BBA67CC9CD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "10E8E5E2-5674-40D5-AD86-8C4DDB442EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "690EDC73-47B5-4891-86A5-37B6ED80E145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA31260C-1C67-4E76-9F56-2359BFA0B197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F1FC50-B6EB-48FD-A2FA-B8BEB05719DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1DE90BD-B5F9-4762-B086-130AB04F3CB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCD5258B-C9DE-47BD-9172-27618F220201",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B3F710-13EF-4A36-B191-E0FCC1D98E23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message.  NOTE: this can be leveraged to gain privileges if there is a symlink to an init script."
    },
    {
      "lang": "es",
      "value": "Postfix antes de 2.3.15, 2.4 anterior a 2.4.8, 2.5 anterior a 2.5.4 y 2.6 antes de 2.6-20080814, cuando el sistema operativo admite enlaces duros (hard links) a enlaces simb\u00f3licos, permite a usuarios locales a\u00f1adir mensajes de correo a un archivo al que apunta un enlace simb\u00f3lico propiedad de root, creando un enlace duro a este enlace simb\u00f3lico y enviando un mensaje despu\u00e9s. NOTA: esto puede ser utilizado para obtener privilegios si hay un enlace simb\u00f3lico a un script init."
    }
  ],
  "evaluatorComment": "Please refer to the following links for additional version information (vendor release notes):\r\n\r\n\r\nPostfix 2.3 - ftp://mirrors.loonybin.net/pub/postfix/official/postfix-2.3.15.RELEASE_NOTES\r\n\r\nPostfix 2.4 - ftp://mirrors.loonybin.net/pub/postfix/official/postfix-2.4.8.RELEASE_NOTES\r\n\r\nPostfix 2.5 - ftp://mirrors.loonybin.net/pub/postfix/official/postfix-2.5.4.RELEASE_NOTES\r\n\r\nPostfix 2.6 - ftp://mirrors.loonybin.net/pub/postfix/experimental/postfix-2.6-20080814.RELEASE_NOTES",
  "id": "CVE-2008-2936",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 1.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-08-18T19:41:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY"
    },
    {
      "source": "secalert@redhat.com",
      "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.3.15.HISTORY"
    },
    {
      "source": "secalert@redhat.com",
      "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY"
    },
    {
      "source": "secalert@redhat.com",
      "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://article.gmane.org/gmane.mail.postfix.announce/110"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31469"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31474"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31477"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31485"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31500"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31530"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/32231"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200808-12.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securityreason.com/securityalert/4160"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0259"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2008/dsa-1629"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/938323"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:171"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0839.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/495474/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/495632/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/495882/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/30691"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1020700"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/2385"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44460"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-2689"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10033"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://usn.ubuntu.com/636-1/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.exploit-db.com/exploits/6337"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.3.15.HISTORY"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://article.gmane.org/gmane.mail.postfix.announce/110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31469"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31474"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31477"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31485"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31500"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31530"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32231"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200808-12.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/4160"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0259"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/938323"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0839.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/495474/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/495632/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/495882/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/30691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020700"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2385"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44460"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2689"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/636-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/6337"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-09-21 19:30
Modified
2025-04-09 00:30
Severity ?
Summary
The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
Impacted products
Vendor Product Version
postfix postfix 2.5.5
debian debian_linux 6.06
ubuntu ubuntu_linux 4.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postfix:postfix:2.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "894002C8-F3C1-4241-96FE-C088BBD0FCED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D47FA7-B5AF-4580-8BA7-8408D98D1F26",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F22916E8-84BE-444D-9B99-199FE8E0F665",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files."
    },
    {
      "lang": "es",
      "value": "El script postfix.postinst en el paquete postfix v2.5.5 de Debian GNU/Linux y Ubuntu permite acceso de escritura al usuario postfix en /var/spool/postfix/pid, permitiendo a usuarios locales dirigir ataques de enlaces simb\u00f3licos que sobrescriban ficheros de su elecci\u00f3n."
    }
  ],
  "id": "CVE-2009-2939",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-09-21T19:30:00.390",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2233"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/09/18/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/09/18/6"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}