{"vuid":"VU#727230","idnumber":"727230","name":"Postfix SMTP server Cyrus SASL support contains a memory corruption vulnerability","keywords":["PostFix SMTP","memory corruption error"],"overview":"The Postfix SMTP server has a memory corruption error when the Cyrus SASL library is used with authentication mechanisms other than PLAIN and LOGIN.","clean_desc":"The Postfix Advisory for CVE-2011-1720 states: \"The Postfix SMTP server fails to create a new Cyrus SASL server handle after authentication failure. This causes memory corruption when, for example, a client requests CRAM-MD5 authentication, fails to authenticate, and then invokes some other authentication mechanism except PLAIN (or ANONYMOUS if available). The likely outcome is that the Postfix SMTP server process crashes with a segmentation violation error (SIGSEGV, a.k.a. signal 11).\" \"The memory corruption is known to result in a program crash (SIGSEV). Remote code execution cannot be excluded. Such code would execute as the unprivileged \"postfix\" user. This user has no control over processes that run with non-postfix privileges including Postfix processes running as root; the impact may be reduced with configurations that enable the Postfix chroot feature or that use platform-dependent privilege-reducing features.\"","impact":"A remote attacker can cause a denial of service or possibly execute arbitrary code.","resolution":"Apply an Update\nThis vulnerability has been fixed in Postfix stable versions 2.5.13, 2.6.10, 2.7.4, 2.8.3. Patches for Postfix version 1.1 and later can be obtained from the Postfix Download Site.","workarounds":"Workarounds The following workaround is provided in the Postfix Advisory for CVE-2011-1720: Disable Cyrus SASL authentication mechanisms for the Postfix SMTP server other than PLAIN and LOGIN. The mechanisms are specified in a Cyrus SASL smtpd.conf configuration file. This file may be found in /etc/postfix/sasl/, /var/lib/sasl2/, /etc/sasl2/, /usr/lib/sasl2/ or /usr/local/lib/sasl2/. In this file, update the \"mech_list:\" entry and remove any methods other than PLAIN and LOGIN. For example, this configuration is not affected: mech_list: PLAIN LOGIN Execute the command \"postfix reload\" to make the change effective, then verify that the \"port 25\" and \"port 587\" services no longer announce other SASL mechanisms, as shown in the previous section.","sysaffected":"","thanks":"Thanks to Thomas Jarosch of Intra2net AG for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["http://www.postfix.org/announcements/postfix-2.8.3.html","http://www.postfix.org/CVE-2011-1720.html","http://www.postfix.org/download.html"],"cveids":["CVE-2011-1720"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-04-18T19:57:47Z","publicdate":"2011-05-09T00:00:00Z","datefirstpublished":"2011-05-11T17:53:12Z","dateupdated":"2011-05-17T11:52:49Z","revision":17,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"8","cam_exploitation":"3","cam_internetinfrastructure":"15","cam_population":"8","cam_impact":"8","cam_easeofexploitation":"4","cam_attackeraccessrequired":"15","cam_scorecurrent":"1.872","cam_scorecurrentwidelyknown":"2.736","cam_scorecurrentwidelyknownexploited":"3.96","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.872,"vulnote":null}