SB2005050224 - Open relay in Postfix
Published: May 2, 2005 Updated: June 8, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Protection Mechanism Failure (CVE-ID: CVE-2005-0337)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures. When /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
Remediation
Install update from vendor's website.
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=267837
- http://marc.info/?l=bugtraq&m=110763358832637&w=2
- http://secunia.com/advisories/14137/
- http://www.redhat.com/support/errata/RHSA-2005-152.html
- http://www.securityfocus.com/bid/12445
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19218
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11339