First published: Mon Jan 22 2024(Updated: )
Timo Longin discovered that Postfix incorrectly handled certain email line endings. A remote attacker could possibly use this issue to bypass an email authentication mechanism, allowing domain spoofing and potential spamming. Please note that certain configuration changes are required to address this issue. They are not enabled by default for backward compatibility. Information can be found at https://www.postfix.org/smtp-smuggling.html.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/postfix | <3.8.1-2ubuntu0.1 | 3.8.1-2ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/postfix | <3.6.4-1ubuntu1.2 | 3.6.4-1ubuntu1.2 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/postfix | <3.4.13-0ubuntu1.3 | 3.4.13-0ubuntu1.3 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/postfix | <3.3.0-1ubuntu0.4+esm2 | 3.3.0-1ubuntu0.4+esm2 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/postfix | <3.1.0-3ubuntu0.4+esm2 | 3.1.0-3ubuntu0.4+esm2 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/postfix | <2.11.0-1ubuntu1.2+esm2 | 2.11.0-1ubuntu1.2+esm2 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6591-1 is categorized as potentially high due to the risk of email authentication bypass, allowing domain spoofing.
To fix USN-6591-1, update the Postfix package to the latest version according to your Ubuntu distribution.
USN-6591-1 affects Postfix versions prior to 3.8.1-2ubuntu0.1 for Ubuntu 23.10, as well as several other earlier versions.
If not addressed, USN-6591-1 could allow remote attackers to impersonate trusted email domains and potentially conduct spam operations.
While the best practice is to update Postfix, you may consider adjusting email settings to mitigate the effects of this vulnerability.