[Systems] [Fwd: [SECURITY] [DSA 2233-1] postfix security update]

Bernie Innocenti bernie at codewiz.org
Tue May 10 19:32:14 EDT 2011


We need to ensure that we're running the latest postfix on all our
machines!

Additionally, machines that do not need to receive email shouldn't have
an smtpd listening on port 25.

-------- Forwarded Message --------
From: Florian Weimer <fw at deneb.enyo.de>
Reply-to: debian-security at lists.debian.org
To: debian-security-announce at lists.debian.org
Subject: [SECURITY] [DSA 2233-1] postfix security update
Date: Tue, 10 May 2011 19:57:47 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2233-1                   security at debian.org
http://www.debian.org/security/                            Florian Weimer
May 10, 2011                           http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : postfix
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2009-2939 CVE-2011-0411 CVE-2011-1720

Several vulnerabilities were discovered in Postfix, a mail transfer
agent.  The Common Vulnerabilities and Exposures project identifies
the following problems:

CVE-2009-2939
        The postinst script grants the postfix user write access to
        /var/spool/postfix/pid, which might allow local users to
        conduct symlink attacks that overwrite arbitrary files.

CVE-2011-0411
        The STARTTLS implementation does not properly restrict I/O
        buffering, which allows man-in-the-middle attackers to insert
        commands into encrypted SMTP sessions by sending a cleartext
        command that is processed after TLS is in place.

CVE-2011-1720
        A heap-based read-only buffer overflow allows malicious
        clients to crash the smtpd server process using a crafted SASL
        authentication request.

For the oldstable distribution (lenny), this problem has been fixed in
version 2.5.5-1.1+lenny1.

For the stable distribution (squeeze), this problem has been fixed in
version 2.7.1-1+squeeze1.

For the unstable distribution (sid), this problem has been fixed in
version 2.8.0-1.

We recommend that you upgrade your postfix packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce at lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJNyXybAAoJEL97/wQC1SS+xb0H/igqYhOTtvO91deptOPyednw
5sBQPXGoo+RXeomLsJk8P6ezm7fEGTSl7GUEpNwS1qsqAPVnl9XAK6dOGFae1PbG
2L93eR6AKgKo60tp2On1Tf1c0HcD6yKiZ6J7C7nZ3E8+yZwSd1k6826ZUQ3gzKKW
DTIu6w2CzzleK/bppWfhAvwvobHD6X1B16qklZfqw6H0C/QfMjM8ZXLCRv9Tq1TN
jX1W4qeed7pr8r3pTJ9npzae7drqFLoVDi0tpGKi0UHEwgRma1AbDaI2BVmeblue
YNRHg7H+TqfrUwN8iB64WrYvqnHCQfvViL8f0ML2uJXJf/lHby+vxPl6EGxAIoY=
=yCCp
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to debian-security-announce-REQUEST at lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster at lists.debian.org
Archive: http://lists.debian.org/87k4dye8v8.fsf@mid.deneb.enyo.de


-- 
 _ // Bernie Innocenti
 \X/  http://codewiz.org



More information about the Systems mailing list