Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN174-1 : courier vulnerability


Vulnerability Assessment Details

USN174-1 : courier vulnerability

Vulnerability Assessment Summary
courier vulnerability

Detailed Explanation for this Vulnerability Assessment

Summary :

These remote packages are missing security patches :
- courier-authdaemon
- courier-authmysql
- courier-authpostgresql
- courier-base
- courier-doc
- courier-faxmail
- courier-imap
- courier-imap-ssl
- courier-ldap
- courier-maildrop
- courier-mlm
- courier-mta
- courier-mta-ssl
- courier-pcp
- courier-pop
- courier-pop-ssl
- courier-ssl
- courier-webadmin
- sqwebmail


Description :

A Denial of Service vulnerability has been discovered in the Courier
mail server. Due to a flawed status code check, failed DNS (domain
name service) queries for SPF (sender policy framework) were not
handled properly and could lead to memory corruption. A malicious DNS
server could exploit this to crash the Courier server.

However, SPF is not enabled by default, so you are only vulnerable if
you explicitly enabled it.

The Ubuntu 4.10 version of courier is not affected by this.

Solution :

Upgrade to :
- courier-authdaemon-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-authmysql-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-authpostgresql-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-base-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-doc-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-faxmail-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-imap-3.0.8-3ubuntu1.1 (Ubuntu 5.04)
- courier-imap-ssl-3.0.8-3ubuntu1.1 (Ubuntu 5.04)
- courier-ldap-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-maildrop-0.47-3ubuntu1.1 (Ubuntu 5.04)
- courier-mlm-
[...]


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi

Cables, Connectors


M.2 NVME SATA SSD Enclosure USB 3.2 Gen 2 10Gbps for M-Key or M+B Key SSD to 8TB picture

M.2 NVME SATA SSD Enclosure USB 3.2 Gen 2 10Gbps for M-Key or M+B Key SSD to 8TB

$40.86



ACASIS 2.5/3.5 inch 2 Bay SATA USB 3.0 Hard Drive Disk HDD SSD Enclosure 4 RAID picture

ACASIS 2.5/3.5 inch 2 Bay SATA USB 3.0 Hard Drive Disk HDD SSD Enclosure 4 RAID

$58.99



Western Digital 250GB WD Blue SA510 SATA SSD, Internal M.2 2280 - WDS250G3B0B picture

Western Digital 250GB WD Blue SA510 SATA SSD, Internal M.2 2280 - WDS250G3B0B

$39.99



N85XX DELL 3.84TB SAS 12GB/S ENTERPRISE SOLID STATE DRIVE (W/ 14TH GEN CADDY) picture

N85XX DELL 3.84TB SAS 12GB/S ENTERPRISE SOLID STATE DRIVE (W/ 14TH GEN CADDY)

$389.95



Patriot P210 128GB 256GB 512GB 1TB 2TB 2.5

Patriot P210 128GB 256GB 512GB 1TB 2TB 2.5" SATA 3 6GB/s Internal SSD PC/MAC Lot

$14.99



Western Digital SN730 256GB M.2 GEN 3x4 PCIe NVMe Solid State Drive SSD 0H22WD picture

Western Digital SN730 256GB M.2 GEN 3x4 PCIe NVMe Solid State Drive SSD 0H22WD

$14.99



Netac 1TB 2TB 512GB Internal SSD 2.5'' SATA III 6Gb/s Solid State Drive lot picture

Netac 1TB 2TB 512GB Internal SSD 2.5'' SATA III 6Gb/s Solid State Drive lot

$13.99



Fanxiang SSD 512GB 1TB 2TB 4TB 2.5'' SSD SATA III Internal Solid State Drive lot picture

Fanxiang SSD 512GB 1TB 2TB 4TB 2.5'' SSD SATA III Internal Solid State Drive lot

$13.99



Fanxiang SSD 512GB 1TB 2TB 4TB 2.5''SATA III Internal Solid State Hard Drive LOT picture

Fanxiang SSD 512GB 1TB 2TB 4TB 2.5''SATA III Internal Solid State Hard Drive LOT

$188.99



Fanxiang M.2 SATA SSD 2TB 1TB 512GB 256GB SSD Internal M2 Solid State Drive Lot picture

Fanxiang M.2 SATA SSD 2TB 1TB 512GB 256GB SSD Internal M2 Solid State Drive Lot

$109.99



Discussions

No Discussions have been posted on this vulnerability.