Логотип exploitDog
product: "postfix"
Консоль
Логотип exploitDog

exploitDog

product: "postfix"
postfix

postfixагент передачи почты (MTA — mail transfer agent).

Релизный цикл, информация об уязвимостях

Продукт: postfix
Вендор: postfix

График релизов

3.53.63.73.83.93.102020202120222023202420252026

Недавние уязвимости postfix

Количество 71

debian логотип

CVE-2005-0337

около 20 лет назад

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_ ...

CVSS2: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2005-0337

около 20 лет назад

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.

CVSS2: 7.5
EPSS: Низкий
redhat логотип

CVE-2005-0337

больше 20 лет назад

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.

EPSS: Низкий
nvd логотип

CVE-2003-0540

почти 22 года назад

The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.

CVSS2: 5
EPSS: Средний
nvd логотип

CVE-2003-0468

почти 22 года назад

Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2003-0468

почти 22 года назад

Postfix 1.1.11 and earlier allows remote attackers to use Postfix to c ...

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2003-0540

почти 22 года назад

The address parser code in Postfix 1.1.12 and earlier allows remote at ...

CVSS2: 5
EPSS: Средний
redhat логотип

CVE-2003-0468

почти 22 года назад

Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.

EPSS: Низкий
redhat логотип

CVE-2003-0540

почти 22 года назад

The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.

EPSS: Средний
redhat логотип

CVE-2001-0894

больше 23 лет назад

Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2005-0337

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_ ...

CVSS2: 7.5
1%
Низкий
около 20 лет назад
ubuntu логотип
CVE-2005-0337

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.

CVSS2: 7.5
1%
Низкий
около 20 лет назад
redhat логотип
CVE-2005-0337

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.

1%
Низкий
больше 20 лет назад
nvd логотип
CVE-2003-0540

The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.

CVSS2: 5
57%
Средний
почти 22 года назад
nvd логотип
CVE-2003-0468

Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.

CVSS2: 5
2%
Низкий
почти 22 года назад
debian логотип
CVE-2003-0468

Postfix 1.1.11 and earlier allows remote attackers to use Postfix to c ...

CVSS2: 5
2%
Низкий
почти 22 года назад
debian логотип
CVE-2003-0540

The address parser code in Postfix 1.1.12 and earlier allows remote at ...

CVSS2: 5
57%
Средний
почти 22 года назад
redhat логотип
CVE-2003-0468

Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.

2%
Низкий
почти 22 года назад
redhat логотип
CVE-2003-0540

The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.

57%
Средний
почти 22 года назад
redhat логотип
CVE-2001-0894

Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large.

1%
Низкий
больше 23 лет назад

Уязвимостей на страницу


Поделиться