QID 357073
Date Published: 2024-02-09
QID 357073: Amazon Linux Security Advisory for postfix : ALAS-2024-1914
Postfix through 3.8.4 allows smtp smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions).
Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed mail from address, allowing bypass of an spf protection mechanism.
This occurs because postfix supports <lf>.<cr><lf> but some other popular e-mail servers do not.
To prevent attack variants (by always disallowing <lf> without <cr>), a different solution is required: the smtpd_forbid_bare_newline=yes option with a postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9. (
( CVE-2023-51764)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS-2024-1914 -
alas.aws.amazon.com/ALAS-2024-1914.html
CVEs related to QID 357073
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS-2024-1914 | amazon linux |
|