FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2011-1720

This CVE name corresponds to:

Entered Topic
2011-05-09 Postfix -- memory corruption vulnerability

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2011-1720
Phase Assigned(20110418)

Description

The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.

References

Source Reference
BUGTRAQ 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)
MLIST [postfix-announce] 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)
CONFIRM http://www.postfix.org/CVE-2011-1720.html
CONFIRM http://www.postfix.org/announcements/postfix-2.8.3.html
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=699035
DEBIAN DSA-2233
GENTOO GLSA-201206-33
MANDRIVA MDVSA-2011:090
SUSE SUSE-SA:2011:023
UBUNTU USN-1131-1
CERT-VN VU#727230
BID 47778
OSVDB 72259
SECTRACK 1025521
SECUNIA 44500
SREASON 8247
XF postfix-cyrus-sasl-code-exec(67359)