First published: Fri Apr 22 2011(Updated: )
A heap-based buffer overread flaw was found in the way Postfix mail transport agent performed SASL handlers management for SMTP sessions, when the Cyrus SASL authentication was enabled. A remote attacker could use this flaw to cause Postfix smtpd server crash via specially-crafted SASL authentication request. Note: The default configuration of Postfix mail transport agent, as shipped with Red Hat Enterprise Linux 4, 5, and 6 do not enable SASL support for SMTP authentication for mail clients (thus Postfix server instances using it are not vulnerable to this flaw). Workaround: If your Postfix server configuration contains directive like: smtpd_sasl_auth_enable = yes change 'yes' to 'no' or comment the whole line out not to be vulnerable to this flaw.
Affected Software | Affected Version | How to fix |
---|---|---|
Postfix |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-699035 is considered moderate due to its potential for causing service disruption.
Fix REDHAT-BUG-699035 by updating Postfix to the latest version that addresses the heap-based buffer overread flaw.
REDHAT-BUG-699035 affects the Postfix mail transport agent when Cyrus SASL authentication is enabled.
REDHAT-BUG-699035 is classified as a heap-based buffer overread vulnerability.
Yes, a remote attacker can exploit REDHAT-BUG-699035 to crash the Postfix smtpd server.