Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-1720

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2011-1720
Last Modified 18 Apr 2013 11:12:54
Published 13 May 2011 01:05:43
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2011-1720

Summary

The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.

Vulnerable Systems

Application

  • Postfix 2.0.0

  • Postfix 2.0.1

  • Postfix 2.0.10

  • Postfix 2.0.11

  • Postfix 2.0.12

  • Postfix 2.0.13

  • Postfix 2.0.14

  • Postfix 2.0.15

  • Postfix 2.0.16

  • Postfix 2.0.17

  • Postfix 2.0.18

  • Postfix 2.0.19

  • Postfix 2.0.2

  • Postfix 2.0.3

  • Postfix 2.0.4

  • Postfix 2.0.5

  • Postfix 2.0.6

  • Postfix 2.0.7

  • Postfix 2.0.8

  • Postfix 2.0.9

  • Postfix 2.1.0

  • Postfix 2.1.1

  • Postfix 2.1.2

  • Postfix 2.1.3

  • Postfix 2.1.4

  • Postfix 2.1.5

  • Postfix 2.1.6

  • Postfix 2.2.0

  • Postfix 2.2.1

  • Postfix 2.2.10

  • Postfix 2.2.11

  • Postfix 2.2.12

  • Postfix 2.2.2

  • Postfix 2.2.3

  • Postfix 2.2.4

  • Postfix 2.2.5

  • Postfix 2.2.6

  • Postfix 2.2.7

  • Postfix 2.2.8

  • Postfix 2.2.9

  • Postfix 2.3

  • Postfix 2.3.0

  • Postfix 2.3.1

  • Postfix 2.3.10

  • Postfix 2.3.11

  • Postfix 2.3.12

  • Postfix 2.3.13

  • Postfix 2.3.14

  • Postfix 2.3.15

  • Postfix 2.3.16

  • Postfix 2.3.17

  • Postfix 2.3.18

  • Postfix 2.3.19

  • Postfix 2.3.2

  • Postfix 2.3.3

  • Postfix 2.3.4

  • Postfix 2.3.5

  • Postfix 2.3.6

  • Postfix 2.3.7

  • Postfix 2.3.8

  • Postfix 2.3.9

  • Postfix 2.4

  • Postfix 2.4.0

  • Postfix 2.4.1

  • Postfix 2.4.10

  • Postfix 2.4.11

  • Postfix 2.4.12

  • Postfix 2.4.13

  • Postfix 2.4.14

  • Postfix 2.4.15

  • Postfix 2.4.2

  • Postfix 2.4.3

  • Postfix 2.4.4

  • Postfix 2.4.5

  • Postfix 2.4.6

  • Postfix 2.4.7

  • Postfix 2.4.8

  • Postfix 2.4.9

  • Postfix 2.5.0

  • Postfix 2.5.1

  • Postfix 2.5.10

  • Postfix 2.5.11

  • Postfix 2.5.12

  • Postfix 2.5.2

  • Postfix 2.5.3

  • Postfix 2.5.4

  • Postfix 2.5.5

  • Postfix 2.5.6

  • Postfix 2.5.7

  • Postfix 2.5.8

  • Postfix 2.5.9

  • Postfix 2.6

  • Postfix 2.6.0

  • Postfix 2.6.1

  • Postfix 2.6.2

  • Postfix 2.6.3

  • Postfix 2.6.4

  • Postfix 2.6.5

  • Postfix 2.6.6

  • Postfix 2.6.7

  • Postfix 2.6.8

  • Postfix 2.6.9

  • Postfix 2.7.0

  • Postfix 2.7.1

  • Postfix 2.7.2

  • Postfix 2.7.3

  • Postfix 2.8.0

  • Postfix 2.8.1

  • Postfix 2.8.2


References

CERT-VN - VU#727230

BID - 47778

CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=699035

XF - postfix-cyrus-sasl-code-exec(67359)

UBUNTU - USN-1131-1

SECTRACK - 1025521

BUGTRAQ - 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)

CONFIRM - http://www.postfix.org/CVE-2011-1720.html

CONFIRM - http://www.postfix.org/announcements/postfix-2.8.3.html

OSVDB - 72259

MANDRIVA - MDVSA-2011:090

MLIST - [postfix-announce] 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)

DEBIAN - DSA-2233

SREASON - 8247

SECUNIA - 44500

SUSE - SUSE-SA:2011:023

GENTOO - GLSA-201206-33

Related Patches

Novell SUSE 2011:7502 postfix security update for SLE 10 SP4 i586


Last Updated: 27 May 2016 11:02:17