|
Family: Ubuntu Local Security Checks --> Category: infos
USN174-1 : courier vulnerability Vulnerability Scan
Vulnerability Scan Summary courier vulnerability
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- courier-authdaemon
- courier-authmysql
- courier-authpostgresql
- courier-base
- courier-doc
- courier-faxmail
- courier-imap
- courier-imap-ssl
- courier-ldap
- courier-maildrop
- courier-mlm
- courier-mta
- courier-mta-ssl
- courier-pcp
- courier-pop
- courier-pop-ssl
- courier-ssl
- courier-webadmin
- sqwebmail
Description :
A Denial of Service vulnerability has been discovered in the Courier
mail server. Due to a flawed status code check, failed DNS (domain
name service) queries for SPF (sender policy framework) were not
handled properly and could lead to memory corruption. A malicious DNS
server could exploit this to crash the Courier server.
However, SPF is not enabled by default, so you are only vulnerable if
you explicitly enabled it.
The Ubuntu 4.10 version of courier is not affected by this.
Solution :
Upgrade to :
- courier-authdaemon-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-authmysql-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-authpostgresql-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-base-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-doc-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-faxmail-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-imap-3.0.8-3ubuntu1.1 (Ubuntu 5.04)
- courier-imap-ssl-3.0.8-3ubuntu1.1 (Ubuntu 5.04)
- courier-ldap-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-maildrop-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-mlm-
[...]
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|