安全研究
安全漏洞
Postfix多个远程拒绝服务攻击漏洞
发布日期:2003-08-04
更新日期:2003-08-08
受影响系统:
Wietse Venema Postfix 20011115描述:
Wietse Venema Postfix 20010228
Wietse Venema Postfix 19991231
Wietse Venema Postfix 19990906
Wietse Venema Postfix 1.0.21
Wietse Venema Postfix 1.1.11
- Debian Linux 3.0 68k
- Debian Linux 3.0 sparc
- Debian Linux 3.0 alpha
- Debian Linux 3.0 IA-32
- Debian Linux 3.0 arm
- Debian Linux 3.0 powerpc
- Debian Linux 3.0 i386
Wietse Venema Postfix 1.1.12
- SuSE Linux 8.1
- SuSE Linux 8.0
- SuSE Linux 7.3
- SuSE Linux 7.2
Wietse Venema Postfix 1.1.13
- Conectiva Linux 8.0
- Conectiva Linux 7.0
BUGTRAQ ID: 8333
CVE(CAN) ID: CVE-2003-0468
Postfix是一款邮件服务程序。
Postfix邮件传输代理当前存在两个漏洞,远程攻击者可以利用这些漏洞对服务程序进行拒绝服务攻击或把Postfix作为DDOS攻击代理。
第一个漏洞是允许攻击者通过"bounce-scan"方法扫描私有保护的网络,攻击者可以提交如下类型的地址 触发:
<[server_ip]:service!@local-host-name>
这个地址会使Postfix连接任意IP地址及任意端口进行SMTP对话,对话失败的信息会反回给远程用户,导致敏感信息泄露。使用这个问题可产生拒绝服务攻击,通过使用多个Postfix主机,不停尝试连接特定主机,可导致主机产生拒绝服务。
此漏洞的CANID为:CAN-2003-0468
第二个漏洞存在与地址解析代码中,通过提供畸形邮件地址,可触发此漏洞。攻击者可以朴实服务产生一个产生bounce的队列,根据配置,可以为<nonexistent@local-server-name>,或者如果用户名被检查的情况下,可以为<nonexistent@[127.0.0.1]>。"mail from""Errors-To"地址必须为"<.!>"或"<.!@local-server-name>"。当准备bounce时Postfix解析和重写地址时会锁住服务。
也可以提供合法的"MAIL FROM"进行SMTP会话,但"RCPT TO"提供类似上面所描述的地址,可导致smtp监听程序停止响应。
<*来源:Michal Zalewski (lcamtuf@echelon.pl)
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=106001525130257&w=2
http://www.debian.org/security/2003/dsa-363
https://www.redhat.com/support/errata/RHSA-2003-251.html
http://www.linux-mandrake.com/en/security/2003/2003-081.php
http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000717
*>
建议:
厂商补丁:
Conectiva
---------
Conectiva已经为此发布了一个安全公告(CLA-2003:717)以及相应补丁:
CLA-2003:717:postfix
链接:http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000717
补丁下载:
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/postfix-1.1.13-1U70_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/postfix-1.1.13-1U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/postfix-doc-1.1.13-1U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/postfix-1.1.13-1U80_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/postfix-1.1.13-1U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/postfix-doc-1.1.13-1U80_1cl.i386.rpm
Debian
------
http://www.debian.org/security/2003/dsa-363
MandrakeSoft
------------
MandrakeSoft已经为此发布了一个安全公告(MDKSA-2003:081)以及相应补丁:
MDKSA-2003:081:Updated postfix packages fix remote DoS
链接:http://www.linux-mandrake.com/en/security/2003/2003-081.php
补丁下载:
Updated Packages:
Corporate Server 2.1:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/corporate/2.1/RPMS/postfix-1.1.13-1.1mdk.i586.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/corporate/2.1/SRPMS/postfix-1.1.13-1.1mdk.src.rpm
Corporate Server 2.1/x86_64:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/x86_64/corporate/2.1/RPMS/postfix-1.1.13-1.2mdk.x86_64.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/x86_64/corporate/2.1/SRPMS/postfix-1.1.13-1.2mdk.src.rpm
Mandrake Linux 8.2:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/8.2/RPMS/postfix-20010228-20.1mdk.i586.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/8.2/SRPMS/postfix-20010228-20.1mdk.src.rpm
Mandrake Linux 8.2/PPC:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/ppc/8.2/RPMS/postfix-20010228-20.1mdk.ppc.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/ppc/8.2/SRPMS/postfix-20010228-20.1mdk.src.rpm
Mandrake Linux 9.0:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.0/RPMS/postfix-1.1.13-1.1mdk.i586.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.0/SRPMS/postfix-1.1.13-1.1mdk.src.rpm
Multi Network Firewall 8.2:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/mnf8.2/RPMS/postfix-20010228-20.1mdk.i586.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/mnf8.2/SRPMS/postfix-20010228-20.1mdk.src.rpm
上述升级软件还可以在下列地址中的任意一个镜像ftp服务器上下载:
http://www.mandrakesecure.net/en/ftp.php
RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2003:251-01)以及相应补丁:
RHSA-2003:251-01:New postfix packages fix security issues.
链接:https://www.redhat.com/support/errata/RHSA-2003-251.html
补丁下载:
Red Hat Linux 7.3:
SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/postfix-1.1.12-0.7.src.rpm
i386:
ftp://updates.redhat.com/7.3/en/os/i386/postfix-1.1.12-0.7.i386.rpm
Red Hat Linux 8.0:
SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/postfix-1.1.12-0.8.src.rpm
i386:
ftp://updates.redhat.com/8.0/en/os/i386/postfix-1.1.12-0.8.i386.rpm
Red Hat Linux 9:
SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/postfix-1.1.12-1.src.rpm
i386:
ftp://updates.redhat.com/9/en/os/i386/postfix-1.1.12-1.i386.rpm
Verification:
MD5 sum Package Name
- --------------------------------------------------------------------------
1c17ca698971a1b5904590b97c0cbf8f 7.3/en/os/SRPMS/postfix-1.1.12-0.7.src.rpm
d862e447c46cc4587dc96d4d44ef1a58 7.3/en/os/i386/postfix-1.1.12-0.7.i386.rpm
e9e79099eb8e23dc0eff8f26d059cf53 8.0/en/os/SRPMS/postfix-1.1.12-0.8.src.rpm
48e8299644a815e5dd67e67ef9aff8b5 8.0/en/os/i386/postfix-1.1.12-0.8.i386.rpm
4c1500d10e8533eda4168a0cd193b561 9/en/os/SRPMS/postfix-1.1.12-1.src.rpm
b3345751920862dc4ab2e82bcc0c51f9 9/en/os/i386/postfix-1.1.12-1.i386.rpm
浏览次数:4250
严重程度:0(网友投票)
绿盟科技给您安全的保障