Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SMTP:EXPLOIT:POSTFIX-AUTH-REUSE

Severity

High

Recommended

No

Recommended Action

Drop

Category

SMTP

Keywords

Postfix SMTP Server SASL AUTH Handle Reuse Memory Corruption

Release Date

2011/06/16

Update Number

1940

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SMTP: Postfix SMTP Server SASL AUTH Handle Reuse Memory Corruption


A memory corruption vulnerability exists in Postfix SMTP server when the Cyrus SASL library is used with authentication mechanisms other than PLAIN, LOGIN and ANONYMOUS. This vulnerability is due to the Postfix server's reuse of a SASL server handle after an authentication failure. This could result in code execution in the context of the process, which is usually run in the context of the user "postfix".

Extended Description

Postfix is prone to a memory-corruption vulnerability that affects the SMTP server when Cyrus SASL support is enabled. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. This issue affects the following Postfix version breaches: 2.5.x prior to 2.5.13 2.6.x prior to 2.6.19 2.7.x prior to 2.7.4 2.8.x prior to 2.8.3

Affected Products

  • Avaya Aura Communication Manager 6.0
  • Avaya Aura Communication Manager 6.0.1
  • Debian Linux 5.0
  • Debian Linux 5.0 Alpha
  • Debian Linux 5.0 Amd64
  • Debian Linux 5.0 Arm
  • Debian Linux 5.0 Armel
  • Debian Linux 5.0 Hppa
  • Debian Linux 5.0 Ia-32
  • Debian Linux 5.0 Ia-64
  • Debian Linux 5.0 M68k
  • Debian Linux 5.0 Mips
  • Debian Linux 5.0 Mipsel
  • Debian Linux 5.0 Powerpc
  • Debian Linux 5.0 S/390
  • Debian Linux 5.0 Sparc
  • Gentoo Linux
  • Kolab Groupware Server 2.1.Beta3
  • Kolab Kolab Groupware Server 2.0.1
  • Kolab Kolab Groupware Server 2.0.2
  • Kolab Kolab Groupware Server 2.0.3
  • Kolab Kolab Groupware Server 2.0.4
  • Kolab Kolab Groupware Server 2.1.0
  • Kolab Kolab Groupware Server 2.1Beta2
  • Kolab Kolab Groupware Server 2.2.0
  • Kolab Kolab Groupware Server 2.2.2
  • Kolab Kolab Groupware Server 2.2.3
  • Kolab Kolab Groupware Server 2.2.4
  • Kolab Kolab Groupware Server 2.2 Beta1
  • Kolab Kolab Groupware Server 2.2 Beta3
  • Kolab Kolab Groupware Server 2.2-Rc1
  • Kolab Kolab Groupware Server 2.2 -Rc2
  • Kolab Kolab Groupware Server 2.2-Rc3
  • Kolab Kolab Groupware Server 2.3.1
  • Mandriva Corporate Server 4.0
  • Mandriva Corporate Server 4.0.0 X86 64
  • Mandriva Enterprise Server 5
  • Mandriva Enterprise Server 5 X86 64
  • Mandriva Linux Mandrake 2009.0
  • Mandriva Linux Mandrake 2009.0 X86 64
  • Mandriva Linux Mandrake 2010.1
  • Mandriva Linux Mandrake 2010.1 X86 64
  • Pardus Linux 2009
  • Red Hat Enterprise Linux 5 Server
  • Red Hat Enterprise Linux Desktop Version 4
  • Red Hat Enterprise Linux AS 4
  • Red Hat Enterprise Linux Desktop 5 Client
  • Red Hat Enterprise Linux Desktop 6
  • Red Hat Enterprise Linux Desktop Optional 6
  • Red Hat Enterprise Linux ES 4
  • Red Hat Enterprise Linux HPC Node 6
  • Red Hat Enterprise Linux HPC Node Optional 6
  • Red Hat Enterprise Linux Server 6
  • Red Hat Enterprise Linux Server Optional 6
  • Red Hat Enterprise Linux Workstation 6
  • Red Hat Enterprise Linux Workstation Optional 6
  • Red Hat Enterprise Linux WS 4
  • Red Hat Fedora 13
  • Red Hat Fedora 14
  • Red Hat Fedora 15
  • SuSE Novell Linux POS 9
  • SuSE Open-Enterprise-Server
  • SuSE openSUSE 11.2
  • SuSE openSUSE 11.3
  • SuSE openSUSE 11.4
  • SuSE SUSE Linux Enterprise 10 SP2
  • SuSE SUSE Linux Enterprise 10 SP3
  • SuSE SUSE Linux Enterprise 10 SP4
  • SuSE SUSE Linux Enterprise 11 SP1
  • SuSE SUSE Linux Enterprise Desktop 10 SP4
  • SuSE SUSE Linux Enterprise Desktop 11 SP1
  • SuSE SUSE Linux Enterprise SDK 11 SP1
  • SuSE SUSE Linux Enterprise Server 10 SP3
  • SuSE SUSE Linux Enterprise Server 10 SP4
  • SuSE SUSE Linux Enterprise Server 11 SP1
  • SuSE SUSE Linux Enterprise Server 9
  • SuSE SUSE Linux Enterprise Teradata 10 SP3
  • Ubuntu Ubuntu Linux 10.04 Amd64
  • Ubuntu Ubuntu Linux 10.04 ARM
  • Ubuntu Ubuntu Linux 10.04 I386
  • Ubuntu Ubuntu Linux 10.04 LTS
  • Ubuntu Ubuntu Linux 10.04 Powerpc
  • Ubuntu Ubuntu Linux 10.04 Sparc
  • Ubuntu Ubuntu Linux 10.10 amd64
  • Ubuntu Ubuntu Linux 10.10 ARM
  • Ubuntu Ubuntu Linux 10.10 i386
  • Ubuntu Ubuntu Linux 10.10 powerpc
  • Ubuntu Ubuntu Linux 11.04 amd64
  • Ubuntu Ubuntu Linux 11.04 ARM
  • Ubuntu Ubuntu Linux 11.04 i386
  • Ubuntu Ubuntu Linux 11.04 powerpc
  • Ubuntu Ubuntu Linux 6.06 LTS Amd64
  • Ubuntu Ubuntu Linux 6.06 LTS I386
  • Ubuntu Ubuntu Linux 6.06 LTS Powerpc
  • Ubuntu Ubuntu Linux 6.06 LTS Sparc
  • Ubuntu Ubuntu Linux 8.04 LTS Amd64
  • Ubuntu Ubuntu Linux 8.04 LTS I386
  • Ubuntu Ubuntu Linux 8.04 LTS Lpia
  • Ubuntu Ubuntu Linux 8.04 LTS Powerpc
  • Ubuntu Ubuntu Linux 8.04 LTS Sparc
  • Wietse Venema Postfix 2.5.12
  • Wietse Venema Postfix 2.5.4
  • Wietse Venema Postfix 2.5.4 Patchlevel 4
  • Wietse Venema Postfix 2.5.5
  • Wietse Venema Postfix 2.6
  • Wietse Venema Postfix 2.6-20080902
  • Wietse Venema Postfix 2.6.9
  • Wietse Venema Postfix 2.7.3
  • Wietse Venema Postfix 2.8

References

  • BugTraq: 47778
  • CVE: CVE-2011-1720

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out