Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:24724
HistoryApr 10, 2020 - 1:02 a.m.

Arbitrary Code Execution

2020-04-1001:02:51
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
15

0.887 High

EPSS

Percentile

98.7%

postfix is vulnerable to arbitrary code execution. A heap-based buffer over-read flaw was found in the way Postfix performed SASL handlers management for SMTP sessions, when Cyrus SASL authentication was enabled. A remote attacker could use this flaw to cause the Postfix smtpd server to crash via a specially-crafted SASL authentication request. The smtpd process was automatically restarted by the postfix master process after the time configured with service_throttle_time elapsed.

References