SuSE9 Security Update : Postfix (YOU Patch Number 12707)

Medium Nessus Plugin ID 53868


The remote SuSE 9 host is missing a security-related patch.


The following bugs have been fixed :

- Remote attackers could potentially exploit a memory corruption issue in postfix' SASL implementation to execute arbitrary code. (CVE-2011-1720)

- Also Postfix did not clear the receive buffer after the STARTTLS command. A man-in-the middle could therefore inject commands in the unencrypted stream that get interpreted in the encrypted phase after STARTTLS.


Apply YOU patch number 12707.

See Also

Plugin Details

Severity: Medium

ID: 53868

File Name: suse9_12707.nasl

Version: $Revision: 1.5 $

Type: local

Agent: unix

Published: 2011/05/11

Modified: 2012/06/14

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2011/05/09

Reference Information

CVE: CVE-2011-0411, CVE-2011-1720