Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Debian Local Security Checks --> Category: infos

[DSA784] DSA-784-1 courier Vulnerability Scan

Vulnerability Scan Summary
DSA-784-1 courier

Detailed Explanation for this Vulnerability Test

A problem has been discovered in the Courier Mail Server. DNS
failures were not handled properly when looking up Sender Policy
Framework (SPF) records, which could allow attackers to cause memory
corruption. The default configuration on Debian has SPF checking
disabled, so most machines are not vulnerable. This is explained in
the "courier" manpage, section SENDER POLICY FRAMEWORK KEYWORDS.
The old stable distribution (woody) is not affected by this problem.
For the stable distribution (sarge) this problem has been fixed in
version 0.47-4sarge1.
For the unstable distribution (sid) this problem has been fixed in
version 0.47-6.
We recommend that you upgrade your courier-mta package.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.