|
|
Subscribe / Log in / New account

Pardus alert 2011-84 (postfix)

From:  Meltem Parmaksız <meltem@pardus.org.tr>
To:  pardus-security@pardus.org.tr
Subject:  [Pardus-security] [PLSA 2011-84] postfix: Heap-Based Buffer Overread
Date:  Tue, 21 Jun 2011 16:08:54 +0300
Message-ID:  <201106211608.54339.meltem@pardus.org.tr>

------------------------------------------------------------------------ Pardus Linux Security Advisory 2011-84 security@pardus.org.tr ------------------------------------------------------------------------ Date: 2011-06-21 Type: Remote ------------------------------------------------------------------------ Summary ======= A vulnerability has been fixed in postfix, which allows remote attackers to cause a denial of service . Description =========== CVE-2011-1720: The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain yrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method. Affected packages: Pardus 2009: postfix, all before 2.6.10-26-7 Resolution ========== There are update(s) for postfix. You can update them via Package Manager or with a single command from console: pisi up postfix References ========== * http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1720 * http://bugs.pardus.org.tr/show_bug.cgi?id=18281 ------------------------------------------------------------------------ _______________________________________________ Pardus-Security mailing list Pardus-Security@pardus.org.tr http://liste.pardus.org.tr/mailman/listinfo/pardus-security


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds