CVE-2011-1720

NameCVE-2011-1720
DescriptionThe SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2233-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
postfix (PTS)buster3.4.23-0+deb10u1fixed
buster (security)3.4.23-0+deb10u2fixed
bullseye3.5.24-0+deb11u1fixed
bookworm3.7.10-0+deb12u1fixed
trixie3.8.5-1fixed
sid3.9.0-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
postfixsourcelenny2.5.5-1.1+lenny1DSA-2233-1
postfixsourcesqueeze2.7.1-1+squeeze1DSA-2233-1
postfixsource(unstable)2.8.3-1

Notes

http://www.postfix.org/CVE-2011-1720.html

Search for package or bug name: Reporting problems