Postfix

Postfix

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 21.85%
  • Veröffentlicht 24.12.2023 05:15:08
  • Zuletzt bearbeitet 04.11.2025 22:15:56

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a publishe...

Exploit
  • EPSS 0.4%
  • Veröffentlicht 24.04.2020 12:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:12

A certain Postfix 2.10.1-7 package could allow an attacker to send an email from an arbitrary-looking sender via a homoglyph attack, as demonstrated by the similarity of \xce\xbf to the 'o' character. This is potentially relevant when the /etc/postfi...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 16.04.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:05:27

Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 might allow local users to gain privileges by leveraging undocumented functionality in Berkeley DB 2.x and later, related to reading settings from DB_CONFIG in th...

Exploit
  • EPSS 0.52%
  • Veröffentlicht 01.10.2014 14:55:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unsp...

  • EPSS 58.26%
  • Veröffentlicht 13.05.2011 17:05:43
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows...

Exploit
  • EPSS 69.45%
  • Veröffentlicht 16.03.2011 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sess...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 21.09.2009 19:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 06.11.2008 15:55:52
  • Zuletzt bearbeitet 09.04.2025 00:30:58

postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files. NOTE: the vendor disp...

  • EPSS 0.06%
  • Veröffentlicht 12.09.2008 16:56:20
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application ...

  • EPSS 0.29%
  • Veröffentlicht 18.08.2008 19:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creatin...