[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2011:0422-01 -- Redhat postfix

ID: oval:org.secpod.oval:def:500040Date: (C)2012-01-31   (M)2021-06-02
Class: PATCHFamily: unix




Postfix is a Mail Transport Agent , supporting LDAP, SMTP AUTH , and TLS. It was discovered that Postfix did not flush the received SMTP commands buffer after switching to TLS encryption for an SMTP session. A man-in-the-middle attacker could use this flaw to inject SMTP commands into a victim"s session during the plain text phase. This would lead to those commands being processed by Postfix after TLS encryption is enabled, possibly allowing the attacker to steal the victim"s mail or authentication credentials. It was discovered that Postfix did not properly check the permissions of users" mailbox files. A local attacker able to create files in the mail spool directory could use this flaw to create mailbox files for other local users, and be able to read mail delivered to those users. Red Hat would like to thank the CERT/CC for reporting CVE-2011-0411, and Sebastian Krahmer of the SuSE Security Team for reporting CVE-2008-2937. The CERT/CC acknowledges Wietse Venema as the original reporter of CVE-2011-0411. Users of Postfix are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. After installing this update, the postfix service will be restarted automatically.

Platform:
Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 4
Product:
postfix
Reference:
RHSA-2011:0422-01
CVE-2008-2937
CVE-2011-0411
CVE    2
CVE-2011-0411
CVE-2008-2937
CPE    45
cpe:/a:postfix:postfix:2.4.10
cpe:/a:postfix:postfix:2.4.2
cpe:/a:postfix:postfix:2.5.1
cpe:/a:postfix:postfix:2.6.0
...

© SecPod Technologies