漏洞信息详情
Postfix多个远程拒绝服务攻击漏洞
- CNNVD编号:CNNVD-200308-157
- 危害等级: 低危
- CVE编号: CVE-2003-0540
- 漏洞类型: 其他
- 发布时间: 2003-08-27
- 威胁类型: 远程
- 更新时间: 2005-10-20
- 厂 商: wietse_venema
- 漏洞来源: Michal Zalewski※ l...
漏洞简介
Postfix是一款邮件服务程序。 Postfix邮件传输代理当前存在两个漏洞,远程攻击者可以利用这些漏洞对服务程序进行拒绝服务攻击或把Postfix作为DDOS攻击代理。 第一个漏洞是允许攻击者通过\"bounce-scan\"方法扫描私有保护的网络,攻击者可以提交如下类型的地址 触发: <[server_ip]:service!@local-host-name> 这个地址会使Postfix连接任意IP地址及任意端口进行SMTP对话,对话失败的信息会反回给远程用户,导致敏感信息泄露。使用这个问题可产生拒绝服务攻击,通过使用多个Postfix主机,不停尝试连接特定主机,可导致主机产生拒绝服务。 此漏洞的CANID为:CAN-2003-0468 第二个漏洞存在与地址解析代码中,通过提供畸形邮件地址,可触发此漏洞。攻击者可以朴实服务产生一个产生bounce的队列,根据配置,可以为<nonexistent@local-server-name>,或者如果用户名被检查的情况下,可以为<nonexistent@[127.0.0.1]>。\"mail from\"\"Errors-To\"地址必须为\"<.!>\"或\"<.!@local-server-name>\"。当准备bounce时Postfix解析和重写地址时会锁住服务。 也可以提供合法的\"MAIL FROM\"进行SMTP会话,但\"RCPT TO\"提供类似上面所描述的地址,可导致smtp监听程序停止响应。
漏洞公告
厂商补丁: Conectiva --------- Conectiva已经为此发布了一个安全公告(CLA-2003:717)以及相应补丁:
CLA-2003:717:postfix
链接: http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000717
补丁下载:
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/postfix-1.1.13-1U70_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/postfix-1.1.13-1U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/postfix-doc-1.1.13-1U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/postfix-1.1.13-1U80_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/postfix-1.1.13-1U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/postfix-doc-1.1.13-1U80_1cl.i386.rpm Debian ------ http://www.debian.org/security/2003/dsa-363 MandrakeSoft ------------ MandrakeSoft已经为此发布了一个安全公告(MDKSA-2003:081)以及相应补丁:
MDKSA-2003:081:Updated postfix packages fix remote DoS
链接: http://www.linux-mandrake.com/en/security/2003/2003-081.php
补丁下载:
Updated Packages:
Corporate Server 2.1:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/corporate/2.1/RPMS/postfix-1.1.13-1.1mdk.i586.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/corporate/2.1/SRPMS/postfix-1.1.13-1.1mdk.src.rpm
Corporate Server 2.1/x86_64:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/x86_64/corporate/2.1/RPMS/postfix-1.1.13-1.2mdk.x86_64.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/x86_64/corporate/2.1/SRPMS/postfix-1.1.13-1.2mdk.src.rpm
Mandrake Linux 8.2:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/8.2/RPMS/postfix-20010228-20.1mdk.i586.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/8.2/SRPMS/postfix-20010228-20.1mdk.src.rpm
Mandrake Linux 8.2/PPC:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/ppc/8.2/RPMS/postfix-20010228-20.1mdk.ppc.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/ppc/8.2/SRPMS/postfix-20010228-20.1mdk.src.rpm
Mandrake Linux 9.0:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.0/RPMS/postfix-1.1.13-1.1mdk.i586.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.0/SRPMS/postfix-1.1.13-1.1mdk.src.rpm
Multi Network Firewall 8.2:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/mnf8.2/RPMS/postfix-20010228-20.1mdk.i586.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/mnf8.2/SRPMS/postfix-20010228-20.1mdk.src.rpm
上述升级软件还可以在下列地址中的任意一个镜像ftp服务器上下载:
http://www.mandrakesecure.net/en/ftp.php RedHat ------ RedHat已经为此发布了一个安全公告(RHSA-2003:251-01)以及相应补丁:
RHSA-2003:251-01:New postfix packages fix security issues.
链接:https://www.redhat.com/support/errata/RHSA-2003-251.HTML
补丁下载:
Red Hat Linux 7.3:
SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/postfix-1.1.12-0.7.src.rpm
i386:
ftp://updates.redhat.com/7.3/en/os/i386/postfix-1.1.12-0.7.i386.rpm
Red Hat Linux 8.0:
SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/postfix-1.1.12-0.8.src.rpm
i386:
ftp://updates.redhat.com/8.0/en/os/i386/postfix-1.1.12-0.8.i386.rpm
Red Hat Linux 9:
SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/postfix-1.1.12-1.src.rpm
i386:
ftp://updates.redhat.com/9/en/os/i386/postfix-1.1.12-1.i386.rpm
Verification:
MD5 sum Package Name
- --------------------------------------------------------------------------
1c17ca698971a1b5904590b97c0cbf8f 7.3/en/os/SRPMS/postfix-1.1.12-0.7.src.rpm
d862e447c46cc4587dc96d4d44ef1a58 7.3/en/os/i386/postfix-1.1.12-0.7.i386.rpm
e9e79099eb8e23dc0eff8f26d059cf53 8.0/en/os/SRPMS/postfix-1.1.12-0.8.src.rpm
48e8299644a815e5dd67e67ef9aff8b5 8.0/en/os/i386/postfix-1.1.12-0.8.i386.rpm
4c1500d10e8533eda4168a0cd193b561 9/en/os/SRPMS/postfix-1.1.12-1.src.rpm
b3345751920862dc4ab2e82bcc0c51f9 9/en/os/i386/postfix-1.1.12-1.i386.rpm
参考网址
来源:US-CERT Vulnerability Note: VU#895508 名称: VU#895508 链接:http://www.kb.cert.org/vuls/id/895508 来源: REDHAT 名称: RHSA-2003:251 链接:http://www.redhat.com/support/errata/RHSA-2003-251.HTML 来源: DEBIAN 名称: DSA-363 链接:http://www.debian.org/security/2003/dsa-363 来源: BID 名称: 8333 链接:http://www.securityfocus.com/bid/8333 来源: SUSE 名称: SuSE-SA:2003:033 链接:http://www.novell.com/linux/security/advisories/2003_033_postfix.HTML 来源: ENGARDE 名称: ESA-20030804-019 链接:http://www.linuxsecurity.com/advisories/engarde_advisory-3517.HTML 来源: SECUNIA 名称: 9433 链接:http://secunia.com/advisories/9433 来源: TRUSTIX 名称: 2003-0029 链接:http://marc.theaimsgroup.com/?l=bugtraq&m=106029188614704&w=2 来源: FULLDISC 名称: 20030804 Postfix 1.1.12 remote DoS / Postfix 1.1.11 bounce scanning 链接:http://lists.grok.org.uk/pipermail/full-disclosure/2003-August/007693.HTML 来源: CONECTIVA 名称: CLA-2003:717 链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000717 来源: MANDRAKE 名称: MDKSA-2003:081 链接:http://www.mandriva.com/security/advisories?name=MDKSA-2003:081 来源: BUGTRAQ 名称: 20030804 Postfix 1.1.12 remote DoS / Postfix 1.1.11 bounce scanning 链接:http://marc.theaimsgroup.com/?l=bugtraq&m=106001525130257&w=2 来源: US Government Resource: oval:org.mitre.oval:def:544 名称: oval:org.mitre.oval:def:544 链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:544
受影响实体
- Wietse_venema Postfix:1999-12-31
- Wietse_venema Postfix:2000-02-28
- Wietse_venema Postfix:2001-11-15
补丁
暂无
评论