Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-51764

Опубликовано: 24 дек. 2023
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS3: 5.3

Описание

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports . but some other popular e-mail servers do not. To prevent attack variants (by always disallowing without ), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

3.8.4-1
esm-infra-legacy/trusty

not-affected

2.11.0-1ubuntu1.2+esm3
esm-infra/bionic

released

3.3.0-1ubuntu0.4+esm3
esm-infra/focal

not-affected

3.4.13-0ubuntu1.4
esm-infra/xenial

released

3.1.0-3ubuntu0.4+esm3
focal

released

3.4.13-0ubuntu1.4
jammy

released

3.6.4-1ubuntu1.3
lunar

ignored

end of life
mantic

released

3.8.1-2ubuntu0.2

Показывать по

EPSS

Процентиль: 95%
0.21846
Средний

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 1 года назад

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.

CVSS3: 5.3
nvd
больше 1 года назад

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.

CVSS3: 5.3
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 5.3
debian
больше 1 года назад

Postfix through 3.8.5 allows SMTP smuggling unless configured with smt ...

suse-cvrf
около 1 года назад

Security update for postfix

EPSS

Процентиль: 95%
0.21846
Средний

5.3 Medium

CVSS3