fkie_cve-2011-1720
Vulnerability from fkie_nvd
Published
2011-05-13 17:05
Modified
2025-04-11 00:51
Severity ?
Summary
The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB5D16A3-59DA-407B-82E4-65C39EBD3710",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E5DF3A2-5F47-4D2A-802B-CE53872DDEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7A4BE9-7CBE-404F-B577-933AC26E6E81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8872C496-2430-4EA6-B417-51C6877B874A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EB9646BA-E57D-4E1D-BF1A-FA137CA00ED8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "66B95D87-5B0B-48F6-8379-2521CFDE7CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A09799F5-6084-4F06-B851-4FEA7873BF35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9230082E-FE88-4001-A614-43E8DD76471B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "258010A6-6B75-4663-AD5C-E7AD48B38DEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "602E668A-1343-457B-B0E1-CAB3CCA05BD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "83C3C7F7-016F-458B-B40D-E06080552045",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FE51A934-BFD2-4E61-9827-A934995BDCAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "BDF57DB8-3D17-4868-9FDF-81A0645FBC5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "1BDE9CC6-A7C7-4B0E-A341-E441EF9C33FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "7D7ECFA4-01CF-4C44-949D-7781767B724A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "A568A8FC-7BB0-431B-8BFE-1BF28DD545B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B2273956-8CEB-439E-8841-953580AE673D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9E074865-92E2-4AFC-8542-00273FDFACEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1274628A-B6F8-48DA-A7B0-7629362A0383",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4FAE9B3D-C867-4100-9F1A-1A925E6BCA2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "123ED520-D9A9-457E-B0FF-2164678F2FDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7F03CC36-4E01-4298-8BF2-208EC2126E2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DA763611-3C94-40EB-AC16-F6860FCBFDAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E8725859-159E-49A5-91F2-12A6B300AE76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3B5347-F7FD-4291-8535-9D71F9F49568",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E2750F62-79D5-41ED-8624-4DC36A23A03D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D09CC9-07C8-42C7-B7B2-25251C8615A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F28A5B6A-466B-4B24-9BD4-9DE15642A724",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8E7B624-C991-4EA1-A977-6C06F57B4E2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E899C1C0-18D1-43DE-BC55-C3C14F5395D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "05F2CA7C-1BCE-4EBB-BFAA-6C27F03CAC9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "903BF741-FD7E-41F7-802D-88A09B7EFFFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7F0A444A-E6FE-4585-BA6C-6061A87C6144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "161082B7-A757-496C-9D35-681851CEA10B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B02E2034-BB39-4B86-81CA-3BB93A4E4849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "29CF0FA6-F4F6-4A4B-89A6-057F835FFE89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0055B0EA-775F-4670-A3F9-C1676DBB97D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "363704AE-66A9-4B58-A57E-47748F299471",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5226F933-9FB6-4BF6-AC3B-1A22D22F92F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0066AE84-D27D-4E9B-851B-40EDFD07C0BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2B739C7B-93CC-4367-B006-E8A721ECBCF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F08A3C19-AEB6-4E0C-A41D-01024DC0A25D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE8A81E-3856-4908-B7B7-9CF511CA2A21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B935272-1EC7-4C70-8299-9DC7594809EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1647690F-D015-4DC4-9FB7-F5E9F0C430D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A814997B-A612-493F-AA85-BA5A187A91FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "449E9764-54F4-46F9-9E4D-F2C96EC5F37E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4A15A5-0994-4A3B-B4CD-1C5D9F411FDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E3FB858-1B20-450B-9181-A1FE1C2B9DB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BBD449-6F03-4EFE-8C87-B5014F0381F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DEBD42EA-B31E-4E37-BF28-FEBB18369A18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B92BCC42-6E9F-44CB-A755-004B6DBD9D41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1B67A4AE-2C1C-49D6-9F53-05CAB51273E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "7A64D948-9441-492F-B9E5-DE5D5A3D7266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6D7BCB67-AF9E-4343-827B-D783C71BAF46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "265AD494-E5EB-423B-9C20-62BCB1C3B9B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "B63D1C8C-6E55-43B1-9479-5CE7A917C501",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "208C73B6-88AF-4D8D-A7BE-8AB4E1A4F07B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "11993437-8CE2-44A7-BEF8-D5F7410DCB52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "E13F9414-C71A-49A7-9A84-BC3151E95598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "546CC4D9-D2F4-4725-AD2D-200E6549BB63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "998D1069-1CF5-42C5-8668-49D72E2D2F17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A2138A68-3F3D-4C7E-9FEB-2C8A445F2789",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED5E0EB5-ECC6-4573-9EA7-83E5741DA3CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "790C02A8-95DD-42BE-8A1C-1C6D6DDCC443",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0A0034F2-585D-4A98-8428-996A726712DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B162B5-DEF5-46AD-87D1-734B3B637D46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0DF3730A-0FFD-4C23-B758-BBA67CC9CD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "10E8E5E2-5674-40D5-AD86-8C4DDB442EE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "690EDC73-47B5-4891-86A5-37B6ED80E145",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B751BA4B-B7C8-4A87-A03C-5C91678FC832",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "08943D31-2139-45D3-A0DB-0C11C31875CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "591FB74F-BD86-4314-A359-739A245D2642",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5F2EF7B2-943F-4DFA-8249-7FC0F9FB0312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "9B3AFC1E-01FF-4F91-8C82-5C16378812C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "95E552B8-8B26-4DEE-BC6A-BC0B01C42474",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "66E26194-A7E6-4A99-8F55-7422A7E9BAB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "58097735-FE3B-48B7-B5EA-3CD530E16031",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CA31260C-1C67-4E76-9F56-2359BFA0B197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "58F1FC50-B6EB-48FD-A2FA-B8BEB05719DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DE90BD-B5F9-4762-B086-130AB04F3CB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD5258B-C9DE-47BD-9172-27618F220201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BC95B8DD-C8C6-4FC4-81A5-23D7669DA22A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "894002C8-F3C1-4241-96FE-C088BBD0FCED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C91BA7D1-2A5B-4721-8E13-6520D6F0114B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FBE79FBB-801F-4B1E-8FB8-CB2A1FAF6EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "253DB571-62B7-4015-A758-9DE55AAB8B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AF9D8C-B11C-4681-84CE-5C86926C85F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "955FBDF4-5103-4B19-A5F1-9468F73C7A54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "4AAC0FF5-9699-4011-8C07-5DDAF13B64A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1262ECC9-7496-4D6B-880E-6CA85EE5CD46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5D1E6461-2F2A-49C5-9B2B-08DE418F2F7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B3F710-13EF-4A36-B191-E0FCC1D98E23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFB5988E-D04B-43B9-A980-82FD44D1D198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "12A1021E-587D-47D3-80E8-43D9CCB4BD72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC9B923-222D-4F7F-970C-0B9ADF4E86F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D31B75AE-FF82-4B70-BDEC-4B0FA791A085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C148A9D5-8899-4956-BE45-C4DBD4A2BE08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "558A2B97-6582-445F-991C-4DD530E991DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "56509587-6CE6-4497-B571-0A014E1FE064",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1B24CEB4-4F57-46CB-990B-AB664CEC96EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5E40EEF8-F075-4B87-BDE7-C2D1A39B2F80",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postfix:postfix:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5044BFB-4F00-4FFC-9A66-2FDC666B6C2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "827897F6-2A24-45EC-A072-8C02BA726069",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9A3CFD6A-86E2-4E7B-BAC2-3163FC7DBF17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7705A10C-0BA3-4F04-B757-5890B6A2A860",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postfix:postfix:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133B8398-2495-47CD-B140-5247ECE86EE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D14612B0-7F74-4ED6-89F9-A11ED75A577F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5F5C105E-B22B-48B4-8DC8-5B747792C102",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method."
},
{
"lang": "es",
"value": "El servidor SMTP en Postfix anterior a v2.5.13, v2.6.x anterior a v2.6.10, v2.7.x anterior a v2.7.4, y v2.8.x anterior a v2.8.3, cuando ciertos m\u00e9todos Cyrus SASL de autenticaci\u00f3n son activados, no crea un nuevo manejador de servidor despu\u00e9s de que la autentificaci\u00f3n falle, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria libre y ca\u00edda de demonio) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a tra\u00b4ves de un comando AUTH no v\u00e1lido con un m\u00e9todo seguido por un comando AUTH con un m\u00e9todo diferente."
}
],
"id": "CVE-2011-1720",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-05-13T17:05:43.207",
"references": [
{
"source": "cve@mitre.org",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44500"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/8247"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2011/dsa-2233"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/727230"
},
{
"source": "cve@mitre.org",
"url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/72259"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.postfix.org/CVE-2011-1720.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/47778"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1025521"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/usn-1131-1"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44500"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/8247"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2233"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/727230"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/72259"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.postfix.org/CVE-2011-1720.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/47778"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025521"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-1131-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…