First published: Tue Aug 05 2003(Updated: )
The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wietse Venema Postfix | =1.0.21 | |
Wietse Venema Postfix | =2001-11-15 | |
Wietse Venema Postfix | =2000-02-28 | |
Wietse Venema Postfix | =1999-12-31 | |
Conectiva Linux | =8.0 | |
Wietse Venema Postfix | =1.1.12 | |
Wietse Venema Postfix | =1999-09-06 | |
Wietse Venema Postfix | =1.1.11 | |
Conectiva Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.