Postfix 2.x Mail Message Date Field RCE (ENTERSEED)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote mail server is affected by a remote code execution
vulnerability.

Description :

According to its banner, the Postfix mail server running on the
remote host is version 2.x from 2.0.8 to 2.1.5 inclusively. It is,
therefore, affected by a remote code execution vulnerability due to
improper sanitization of the email date field. An unauthenticated,
remote attacker can exploit this, via a specially crafted email, to
execute arbitrary code.

ENTERSEED is one of multiple Equation Group vulnerabilities and
exploits disclosed on 2016/04/08 by a group known as the Shadow
Brokers.

See also :

https://github.com/x0rz/EQGRP/blob/master/Linux/bin/enterseed.py

Solution :

Upgrade to the latest version of Postfix.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 9.5
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: SMTP problems

Nessus Plugin ID: 100465 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now