SuSE9 Security Update : Postfix (YOU Patch Number 12707)

medium Nessus Plugin ID 53868

Synopsis

The remote SuSE 9 host is missing a security-related patch.

Description

The following bugs have been fixed :

- Remote attackers could potentially exploit a memory corruption issue in postfix' SASL implementation to execute arbitrary code. (CVE-2011-1720)

- Also Postfix did not clear the receive buffer after the STARTTLS command. A man-in-the middle could therefore inject commands in the unencrypted stream that get interpreted in the encrypted phase after STARTTLS.
(CVE-2011-0411)

Solution

Apply YOU patch number 12707.

See Also

http://support.novell.com/security/cve/CVE-2011-0411.html

http://support.novell.com/security/cve/CVE-2011-1720.html

Plugin Details

Severity: Medium

ID: 53868

File Name: suse9_12707.nasl

Version: 1.8

Type: local

Agent: unix

Published: 5/11/2011

Updated: 1/14/2021

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 5/9/2011

Reference Information

CVE: CVE-2011-0411, CVE-2011-1720