[Forgot Password]
Login  Register Subscribe

23631

 
 

115036

 
 

95906

 
 

909

 
 

77949

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-1720

Date: (C)2011-05-13   (M)2017-08-18
 
CVSS Score: 6.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.

Reference:
SECTRACK-1025521
http://www.securityfocus.com/archive/1/archive/1/517917/100/0/threaded
SECUNIA-44500
BID-47778
OSVDB-72259
SREASON-8247
DSA-2233
GLSA-201206-33
MDVSA-2011:090
SUSE-SA:2011:023
USN-1131-1
VU#727230
http://www.mail-archive.com/postfix-announce@postfix.org/msg00007.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://www.postfix.org/CVE-2011-1720.html
http://www.postfix.org/announcements/postfix-2.8.3.html
https://bugzilla.redhat.com/show_bug.cgi?id=699035
postfix-cyrus-sasl-code-exec(67359)

CPE    109
cpe:/a:postfix:postfix:2.2.4
cpe:/a:postfix:postfix:2.2.5
cpe:/a:postfix:postfix:2.6.1
cpe:/a:postfix:postfix:2.2.6
...
CWE    1
CWE-119
OVAL    11
oval:org.secpod.oval:def:102663
oval:org.secpod.oval:def:102659
oval:org.secpod.oval:def:200640
oval:org.secpod.oval:def:200639
...

© 2013 SecPod Technologies