Bug 703468 - CVE-2011-1720: Memory corruption in Postfix SMTP server Cyrus SASL support [fedora-all]
Summary: CVE-2011-1720: Memory corruption in Postfix SMTP server Cyrus SASL support [f...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Fedora
Classification: Fedora
Component: postfix
Version: 14
Hardware: All
OS: Linux
unspecified
urgent
Target Milestone: ---
Assignee: Jaroslav Škarvada
QA Contact: Fedora Extras Quality Assurance
URL: http://www.postfix.org/CVE-2011-1720....
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-05-10 12:51 UTC by Jan ONDREJ
Modified: 2011-05-10 13:44 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-05-10 13:44:32 UTC
Type: ---


Attachments (Terms of Use)

Description Jan ONDREJ 2011-05-10 12:51:02 UTC
Description of problem:
The Postfix SMTP server has a memory corruption error when the Cyrus SASL library is used with authentication mechanisms other than PLAIN and LOGIN (the ANONYMOUS mechanism is unaffected but should not be enabled for different reasons). See below for instructions to determine what systems are affected.

Examples of affected Cyrus SASL authentication methods are CRAM-MD5, DIGEST-MD5, EXTERNAL, GSSAPI, KERBEROS_V4, NTLM, OTP, PASSDSS-3DES-1, and SRP.

The error was introduced with the Postfix SASL patch, and is present in all Postfix versions where the command "postconf mail_release_date" reports a value of 20000314 (March 14, 2000) or greater.

This problem was discovered by Thomas Jarosch of Intra2net AG.

The memory corruption is known to result in a program crash (SIGSEV). Remote code execution cannot be excluded. Such code would execute as the unprivileged "postfix" user. This user has no control over processes that run with non-postfix privileges including Postfix processes running as root; the impact may be reduced with configurations that enable the Postfix chroot feature or that use platform-dependent privilege-reducing features.

The problem is fixed in Postfix stable releases 2.5.13, 2.6.10, 2.7.4, 2.8.3; in the Postfix 2.9 development release as of May 1, 2011; patches exist for Postfix version 1.1 and later. All this is available from Postfix mirror sites listed at http://www.postfix.org/download.html. 

Version-Release number of selected component (if applicable):
postfix-2.7.3-1.fc14.i686

How reproducible:
not tested

Additional information:
http://www.postfix.org/CVE-2011-1720.html

Comment 1 Jaroslav Škarvada 2011-05-10 13:44:32 UTC
It is already in Bodhi, please give it positive karma, F14 version:
https://admin.fedoraproject.org/updates/postfix-2.7.4-1.fc14


Note You need to log in before you can comment on or make changes to this bug.