Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    20 Nov 2024, 23:44
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000717 - | |
| References | () http://marc.info/?l=bugtraq&m=106001525130257&w=2 - | |
| References | () http://secunia.com/advisories/9433 - | |
| References | () http://www.debian.org/security/2003/dsa-363 - Patch, Vendor Advisory | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2003:081 - | |
| References | () http://www.novell.com/linux/security/advisories/2003_033_postfix.html - | |
| References | () http://www.redhat.com/support/errata/RHSA-2003-251.html - | |
| References | () http://www.securityfocus.com/bid/8333 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A522 - | 
Information
                Published : 2003-08-27 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2003-0468
Mitre link : CVE-2003-0468
CVE.ORG link : CVE-2003-0468
JSON object : View
Products Affected
                wietse_venema
- postfix
conectiva
- linux
CWE
                