CVE-2011-1720

NameCVE-2011-1720
DescriptionThe SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2233-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
postfix (PTS)wheezy2.9.6-2fixed
jessie2.11.3-1+deb8u2fixed
stretch3.1.6-0+deb9u1fixed
buster, sid3.2.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
postfixsource(unstable)2.8.3-1medium
postfixsourcelenny2.5.5-1.1+lenny1mediumDSA-2233-1
postfixsourcesqueeze2.7.1-1+squeeze1mediumDSA-2233-1

Notes

http://www.postfix.org/CVE-2011-1720.html

Search for package or bug name: Reporting problems