Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-51764

Опубликовано: 24 дек. 2023
Источник: debian
EPSS Средний

Описание

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
postfixfixed3.8.4-1package
postfixfixed3.7.9-0+deb12u1bookwormpackage
postfixfixed3.5.23-0+deb11u1bullseyepackage

Примечания

  • https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/

  • https://www.openwall.com/lists/oss-security/2023/12/21/6

  • https://www.postfix.org/smtp-smuggling.html

  • https://www.mail-archive.com/postfix-users@postfix.org/msg100901.html

  • https://lists.debian.org/debian-stable-announce/2023/12/msg00004.html

  • Short-term Mitigation: smtpd_forbid_unauth_pipelining = yes

  • Long-term fix with new (optional) feature that is disabled by default:

  • New setting: smtpd_forbid_bare_newline = yes

  • https://www.openwall.com/lists/oss-security/2023/12/22/3

  • Fixes for older releases: https://www.postfix.org/smtp-smuggling.html#back-ports

EPSS

Процентиль: 95%
0.21846
Средний

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 1 года назад

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.

CVSS3: 5.3
redhat
больше 1 года назад

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.

CVSS3: 5.3
nvd
больше 1 года назад

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.

CVSS3: 5.3
msrc
больше 1 года назад

Описание отсутствует

suse-cvrf
около 1 года назад

Security update for postfix

EPSS

Процентиль: 95%
0.21846
Средний