Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000717 - | |
References | () http://marc.info/?l=bugtraq&m=106001525130257&w=2 - | |
References | () http://secunia.com/advisories/9433 - | |
References | () http://www.debian.org/security/2003/dsa-363 - Patch, Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2003:081 - | |
References | () http://www.novell.com/linux/security/advisories/2003_033_postfix.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2003-251.html - | |
References | () http://www.securityfocus.com/bid/8333 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A522 - |
Information
Published : 2003-08-27 04:00
Updated : 2024-11-20 23:44
NVD link : CVE-2003-0468
Mitre link : CVE-2003-0468
CVE.ORG link : CVE-2003-0468
JSON object : View
Products Affected
wietse_venema
- postfix
conectiva
- linux
CWE