Family: Debian Local Security Checks --> Category: infos
[DSA784] DSA-784-1 courier Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
A problem has been discovered in the Courier Mail Server. DNS
failures were not handled properly when looking up Sender Policy
Framework (SPF) records, which could allow attackers to cause memory
corruption. The default configuration on Debian has SPF checking
disabled, so most machines are not vulnerable. This is explained in
the "courier" manpage, section SENDER POLICY FRAMEWORK KEYWORDS.
The old stable distribution (woody) is not affected by this problem.
For the stable distribution (sarge) this problem has been fixed in
For the unstable distribution (sid) this problem has been fixed in
We recommend that you upgrade your courier-mta package.
Solution : http://www.debian.org/security/2005/dsa-784
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.