Описание
Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2005-0337
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19218
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11339
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=267837
- http://marc.info/?l=bugtraq&m=110763358832637&w=2
- http://secunia.com/advisories/14137
- http://www.redhat.com/support/errata/RHSA-2005-152.html
- http://www.securityfocus.com/bid/12445
EPSS
CVE ID
Связанные уязвимости
Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_ ...
EPSS