安全研究

安全漏洞
Postfix多个远程拒绝服务攻击漏洞

发布日期:2003-08-04
更新日期:2003-08-08

受影响系统:
Wietse Venema Postfix 20011115
Wietse Venema Postfix 20010228
Wietse Venema Postfix 19991231
Wietse Venema Postfix 19990906
Wietse Venema Postfix 1.0.21
Wietse Venema Postfix 1.1.11
    - Debian Linux 3.0 68k
    - Debian Linux 3.0 sparc
    - Debian Linux 3.0 alpha
    - Debian Linux 3.0 IA-32
    - Debian Linux 3.0 arm
    - Debian Linux 3.0 powerpc
    - Debian Linux 3.0 i386
Wietse Venema Postfix 1.1.12
    - SuSE Linux 8.1
    - SuSE Linux 8.0
    - SuSE Linux 7.3
    - SuSE Linux 7.2
Wietse Venema Postfix 1.1.13
    - Conectiva Linux 8.0
    - Conectiva Linux 7.0
描述:
BUGTRAQ  ID: 8333
CVE(CAN) ID: CVE-2003-0468

Postfix是一款邮件服务程序。

Postfix邮件传输代理当前存在两个漏洞,远程攻击者可以利用这些漏洞对服务程序进行拒绝服务攻击或把Postfix作为DDOS攻击代理。

第一个漏洞是允许攻击者通过"bounce-scan"方法扫描私有保护的网络,攻击者可以提交如下类型的地址 触发:

  <[server_ip]:service!@local-host-name>

这个地址会使Postfix连接任意IP地址及任意端口进行SMTP对话,对话失败的信息会反回给远程用户,导致敏感信息泄露。使用这个问题可产生拒绝服务攻击,通过使用多个Postfix主机,不停尝试连接特定主机,可导致主机产生拒绝服务。

此漏洞的CANID为:CAN-2003-0468

第二个漏洞存在与地址解析代码中,通过提供畸形邮件地址,可触发此漏洞。攻击者可以朴实服务产生一个产生bounce的队列,根据配置,可以为<nonexistent@local-server-name>,或者如果用户名被检查的情况下,可以为<nonexistent@[127.0.0.1]>。"mail from""Errors-To"地址必须为"<.!>"或"<.!@local-server-name>"。当准备bounce时Postfix解析和重写地址时会锁住服务。

也可以提供合法的"MAIL FROM"进行SMTP会话,但"RCPT TO"提供类似上面所描述的地址,可导致smtp监听程序停止响应。

<*来源:Michal Zalewski (lcamtuf@echelon.pl
  
  链接:http://marc.theaimsgroup.com/?l=bugtraq&m=106001525130257&w=2
        http://www.debian.org/security/2003/dsa-363
        https://www.redhat.com/support/errata/RHSA-2003-251.html
        http://www.linux-mandrake.com/en/security/2003/2003-081.php
        http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000717
*>

建议:
厂商补丁:

Conectiva
---------
Conectiva已经为此发布了一个安全公告(CLA-2003:717)以及相应补丁:
CLA-2003:717:postfix
链接:http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000717

补丁下载:

ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/postfix-1.1.13-1U70_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/postfix-1.1.13-1U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/postfix-doc-1.1.13-1U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/postfix-1.1.13-1U80_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/postfix-1.1.13-1U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/postfix-doc-1.1.13-1U80_1cl.i386.rpm

Debian
------
http://www.debian.org/security/2003/dsa-363

MandrakeSoft
------------
MandrakeSoft已经为此发布了一个安全公告(MDKSA-2003:081)以及相应补丁:
MDKSA-2003:081:Updated postfix packages fix remote DoS
链接:http://www.linux-mandrake.com/en/security/2003/2003-081.php

补丁下载:

Updated Packages:

Corporate Server 2.1:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/corporate/2.1/RPMS/postfix-1.1.13-1.1mdk.i586.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/corporate/2.1/SRPMS/postfix-1.1.13-1.1mdk.src.rpm

Corporate Server 2.1/x86_64:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/x86_64/corporate/2.1/RPMS/postfix-1.1.13-1.2mdk.x86_64.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/x86_64/corporate/2.1/SRPMS/postfix-1.1.13-1.2mdk.src.rpm

Mandrake Linux 8.2:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/8.2/RPMS/postfix-20010228-20.1mdk.i586.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/8.2/SRPMS/postfix-20010228-20.1mdk.src.rpm

Mandrake Linux 8.2/PPC:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/ppc/8.2/RPMS/postfix-20010228-20.1mdk.ppc.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/ppc/8.2/SRPMS/postfix-20010228-20.1mdk.src.rpm

Mandrake Linux 9.0:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.0/RPMS/postfix-1.1.13-1.1mdk.i586.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.0/SRPMS/postfix-1.1.13-1.1mdk.src.rpm

Multi Network Firewall 8.2:
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/mnf8.2/RPMS/postfix-20010228-20.1mdk.i586.rpm
ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/mnf8.2/SRPMS/postfix-20010228-20.1mdk.src.rpm

上述升级软件还可以在下列地址中的任意一个镜像ftp服务器上下载:
http://www.mandrakesecure.net/en/ftp.php

RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2003:251-01)以及相应补丁:
RHSA-2003:251-01:New postfix packages fix security issues.
链接:https://www.redhat.com/support/errata/RHSA-2003-251.html

补丁下载:

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/postfix-1.1.12-0.7.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/postfix-1.1.12-0.7.i386.rpm

Red Hat Linux 8.0:

SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/postfix-1.1.12-0.8.src.rpm

i386:
ftp://updates.redhat.com/8.0/en/os/i386/postfix-1.1.12-0.8.i386.rpm

Red Hat Linux 9:

SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/postfix-1.1.12-1.src.rpm

i386:
ftp://updates.redhat.com/9/en/os/i386/postfix-1.1.12-1.i386.rpm


Verification:

MD5 sum                          Package Name
- --------------------------------------------------------------------------
1c17ca698971a1b5904590b97c0cbf8f 7.3/en/os/SRPMS/postfix-1.1.12-0.7.src.rpm
d862e447c46cc4587dc96d4d44ef1a58 7.3/en/os/i386/postfix-1.1.12-0.7.i386.rpm
e9e79099eb8e23dc0eff8f26d059cf53 8.0/en/os/SRPMS/postfix-1.1.12-0.8.src.rpm
48e8299644a815e5dd67e67ef9aff8b5 8.0/en/os/i386/postfix-1.1.12-0.8.i386.rpm
4c1500d10e8533eda4168a0cd193b561 9/en/os/SRPMS/postfix-1.1.12-1.src.rpm
b3345751920862dc4ab2e82bcc0c51f9 9/en/os/i386/postfix-1.1.12-1.i386.rpm

浏览次数:4250
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障