[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2233-1 postfix -- several

ID: oval:org.secpod.oval:def:600524Date: (C)2011-05-27   (M)2023-11-09
Class: PATCHFamily: unix




Several vulnerabilities were discovered in Postfix, a mail transfer agent. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-2939 The postinst script grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files. CVE-2011-0411 The STARTTLS implementation does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place. CVE-2011-1720 A heap-based read-only buffer overflow allows malicious clients to crash the smtpd server process using a crafted SASL authentication request.

Platform:
Debian 5.0
Debian 6.0
Product:
postfix
Reference:
DSA-2233-1
CVE-2009-2939
CVE-2011-0411
CVE-2011-1720
CVE    3
CVE-2011-0411
CVE-2011-1720
CVE-2009-2939
CPE    112
cpe:/a:postfix:postfix:2.2.4
cpe:/a:postfix:postfix:2.6.0
cpe:/a:postfix:postfix:2.2.5
cpe:/a:postfix:postfix:2.6.1
...

© SecPod Technologies