First published: Tue Aug 05 2003(Updated: )
The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postfix | =1.0.21 | |
Postfix | =1.1.11 | |
Postfix | =1.1.12 | |
Postfix | =1999-09-06 | |
Postfix | =1999-12-31 | |
Postfix | =2000-02-28 | |
Postfix | =2001-11-15 | |
Conectiva Linux | =7.0 | |
Conectiva Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0540 has a severity rating that indicates it can lead to a denial of service condition.
To fix CVE-2003-0540, upgrade Postfix to version 1.1.13 or later.
Postfix versions 1.1.12 and earlier are affected by CVE-2003-0540.
Yes, CVE-2003-0540 can be exploited remotely through malformed envelope addresses.
Symptoms include unexpected locking of the nqmgr process within the Postfix mail server.