Subject: Re: 2 Postfix vulnerabilities -- Postfix 2.0.6 backport for -rnetbsd-1-6 ?
To: Brian A. Seklecki <lavalamp@spiritual-machines.org>
From: Perry E. Metzger <perry@piermont.com>
List: tech-security
Date: 08/04/2003 22:38:40
"Brian A. Seklecki" <lavalamp@spiritual-machines.org> writes:
> This might call for a backport of the 2.0.6 upgrades from -current into
> the -rnetbsd-1-6 branch:
> 
> http://cvsweb.netbsd.org/bsdweb.cgi/src/gnu/usr.sbin/postfix/Makefile
> 
> http://www.securityfocus.com/archive/1/331713/2003-08-01/2003-08-07/0
> 
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0540
> 
> However I havn't seen a proof-of-concept documented.  I'm going to test
> it now.

There is no point in that.

The fix for 1.1.13 is literally a one line patch. Just get it from
Wietse's site and the releng guys can apply it to the branch.

BTW, the bug is not a break in threat -- just a DoS threat.

Perry


> 
> -lava
> 
> -----Forwarded Message-----
> 
> Security Advisory - RHSA-2003:251-07
> ------------------------------------------------------------------------------
> Summary:
> New postfix packages fix security issues.
> 
> New Postfix packages that fix two potential security issues are now available.
> 
> Description:
> Postfix is a Mail Transport Agent (MTA).
> 
> Two security issues have been found in Postfix that affect the Postfix
> packages in Red Hat Linux 7.3, 8.0, and 9. 
> 
> Postfix versions before 1.1.12 allow an attacker to bounce-scan private
> networks, or use the daemon as a DDoS tool by forcing the daemon to connect
> to an arbitrary service at an arbitrary IP address and receiving either a
> bounce message or by analyzing timing.  The Common Vulnerabilities and
> Exposures project (cve.mitre.org) has assigned the name CAN-2003-0468 to
> this issue.
> 
> Postfix versions from 1.1 up to and including 1.1.12 have a bug where a
> remote attacker could send a malformed envelope address and:
> 
> 1) cause the queue manager to lock up until an entry is removed from the
> queue or,
> 
> 2) lock up the SMTP listener, leading to a DoS.
> 
> The Common Vulnerabilities and Exposures project (cve.mitre.org) has
> assigned the name CAN-2003-0540 to this issue.
> 
> Users of Postfix are advised to upgrade to these erratum packages, which
> contain a version of Postfix 1.1.12 with the addition of a security patch
> and is not vulnerable to either of these issues.
> 
> Red Hat would like to thank Michal Zalewski for discovering and disclosing
> the flaws and to Wietse Venema for providing patches.
> [...snip...]
> 
> 
> 

-- 
Perry E. Metzger		perry@piermont.com