Computer Security
[EN] securityvulns.ru no-pyccku


Postfix memory corruption
Published:10.05.2011
Source:
SecurityVulns ID:11661
Type:remote
Threat Level:
6/10
Description:Memory corruption if Cyrus SASL library is used for CRAM authentications.
Affected:POSTFIX : postfix 2.5
 POSTFIX : postfix 2.6
 POSTFIX : postfix 2.7
 POSTFIX : postfix 2.8
 POSTFIX : postfix 2.9
CVE:CVE-2011-1720 (The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.)
Original documentdocumentWietse Venema, Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720) (10.05.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod