Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.69666
Categoría:Mandrake Local Security Checks
Título:Mandriva Security Advisory MDVSA-2011:090 (postfix)
Resumen:NOSUMMARY
Descripción:Description:
The remote host is missing an update to postfix
announced via advisory MDVSA-2011:090.

A vulnerability has been found and corrected in postfix:

The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10,
2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL
authentication methods are enabled, does not create a new server handle
after client authentication fails, which allows remote attackers to
cause a denial of service (heap memory corruption and daemon crash)
or possibly execute arbitrary code via an invalid AUTH command
with one method followed by an AUTH command with a different method
(CVE-2011-1720).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been patched to correct this issue.

Affected: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2011:090

Risk factor : High

CVSS Score:
6.8

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2011-1720
BugTraq ID: 47778
http://www.securityfocus.com/bid/47778
Bugtraq: 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720) (Google Search)
http://www.securityfocus.com/archive/1/517917/100/0/threaded
CERT/CC vulnerability note: VU#727230
http://www.kb.cert.org/vuls/id/727230
Debian Security Information: DSA-2233 (Google Search)
http://www.debian.org/security/2011/dsa-2233
http://security.gentoo.org/glsa/glsa-201206-33.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2011:090
http://www.mail-archive.com/postfix-announce@postfix.org/msg00007.html
http://www.osvdb.org/72259
http://www.securitytracker.com/id?1025521
http://secunia.com/advisories/44500
http://securityreason.com/securityalert/8247
SuSE Security Announcement: SUSE-SA:2011:023 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html
http://www.ubuntu.com/usn/usn-1131-1
XForce ISS Database: postfix-cyrus-sasl-code-exec(67359)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67359
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.