Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-9243

Опубликовано: 14 нояб. 2024
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2024-9243: postfix security update (MODERATE)

[2:3.5.25-1]

  • New version Resolves: RHEL-20023
  • Dropped upstreamed patches

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

postfix

3.5.25-1.el9

postfix-cdb

3.5.25-1.el9

postfix-ldap

3.5.25-1.el9

postfix-lmdb

3.5.25-1.el9

postfix-mysql

3.5.25-1.el9

postfix-pcre

3.5.25-1.el9

postfix-perl-scripts

3.5.25-1.el9

postfix-pgsql

3.5.25-1.el9

postfix-sqlite

3.5.25-1.el9

Oracle Linux x86_64

postfix

3.5.25-1.el9

postfix-cdb

3.5.25-1.el9

postfix-ldap

3.5.25-1.el9

postfix-lmdb

3.5.25-1.el9

postfix-mysql

3.5.25-1.el9

postfix-pcre

3.5.25-1.el9

postfix-perl-scripts

3.5.25-1.el9

postfix-pgsql

3.5.25-1.el9

postfix-sqlite

3.5.25-1.el9

Связанные CVE

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 1 года назад

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.

CVSS3: 5.3
redhat
больше 1 года назад

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.

CVSS3: 5.3
nvd
больше 1 года назад

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.

CVSS3: 5.3
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 5.3
debian
больше 1 года назад

Postfix through 3.8.5 allows SMTP smuggling unless configured with smt ...