Short Name |
SMTP:EXPLOIT:POSTFIX-AUTH-REUSE |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
SMTP |
Keywords |
Postfix SMTP Server SASL AUTH Handle Reuse Memory Corruption |
Release Date |
2011/06/16 |
Update Number |
1940 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
A memory corruption vulnerability exists in Postfix SMTP server when the Cyrus SASL library is used with authentication mechanisms other than PLAIN, LOGIN and ANONYMOUS. This vulnerability is due to the Postfix server's reuse of a SASL server handle after an authentication failure. This could result in code execution in the context of the process, which is usually run in the context of the user "postfix".
Postfix is prone to a memory-corruption vulnerability that affects the SMTP server when Cyrus SASL support is enabled. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. This issue affects the following Postfix version breaches: 2.5.x prior to 2.5.13 2.6.x prior to 2.6.19 2.7.x prior to 2.7.4 2.8.x prior to 2.8.3