The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2233-1 | postfix security update |
Ubuntu USN |
USN-1131-1 | Postfix vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T22:37:25.642Z
Reserved: 2011-04-18T00:00:00
Link: CVE-2011-1720
No data.
Status : Deferred
Published: 2011-05-13T17:05:43.207
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-1720
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN