A certain Postfix 2.10.1-7 package could allow an attacker to send an email from an arbitrary-looking sender via a homoglyph attack, as demonstrated by the similarity of \xce\xbf to the 'o' character. This is potentially relevant when the /etc/postfix/sender_login feature is used, because a spoofed outbound message that uses a configured sender address is blocked with a "Sender address rejected: not logged in" error message, but a spoofed outbound message that uses a homoglyph of a configured sender address is not blocked. NOTE: some third parties argue that any missed blocking of spoofed outbound messages - except for exact matches to a sender address in the /etc/postfix/sender_login file - is outside the design goals of Postfix and thus cannot be considered a Postfix vulnerability

Project Subscriptions

Vendors Products
Postfix Subscribe
Postfix Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00436}

epss

{'score': 0.00401}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T11:48:57.775Z

Reserved: 2020-04-22T00:00:00

Link: CVE-2020-12063

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-24T12:15:12.877

Modified: 2024-11-21T04:59:12.257

Link: CVE-2020-12063

cve-icon Redhat

Severity :

Publid Date: 2020-04-24T00:00:00Z

Links: CVE-2020-12063 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses