First published: Fri Jul 05 2019(Updated: )
## Incorrect query parsing ### Impact All users of versions prior to 0.5.1 can receive incorrect response from daemon under rare conditions, rendering downgrade of effective STS policy. ### Patches Problem has been patched in version 0.5.1 ### Workarounds Users may remediate this vulnerability without upgrading by applying [these patches](https://gist.github.com/Snawoot/b9da85d6b26dea5460673b29df1adc6b) to older suppoorted versions. ### For more information If you have any questions or comments about this advisory: * Open an issue in [postfix-mta-sts-resolver repo](https://github.com/Snawoot/postfix-mta-sts-resolver) * Email me at [vladislav at vm-0 dot com](mailto:vladislav-ex-gh-advisory@vm-0.com)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/postfix-mta-sts-resolver | <0.5.1 | 0.5.1 |
Postfix | <0.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16791 is considered a medium severity vulnerability due to the potential impact on the effective STS policy.
To fix CVE-2019-16791, upgrade to version 0.5.1 of postfix-mta-sts-resolver or a later version.
CVE-2019-16791 affects all users of postfix-mta-sts-resolver versions prior to 0.5.1.
CVE-2019-16791 can cause users to receive incorrect responses from the daemon, potentially leading to a downgrade of the effective STS policy.
No specific workaround is suggested for CVE-2019-16791 other than upgrading to the patched version.