Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-1720

EPSS 41.82% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2011-1720

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Postfix SMTP Server Cyrus SASL认证方法缓冲区溢出漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Postfix是Unix类操作系统中所使用的邮件传输代理。 Postfix 2.5.13之前版本,2.6.10之前的2.6.x版本,2.7.4之前的2.7.x版本和2.8.3之前的2.8.x版本的SMTP服务器中存在缓冲区溢出漏洞。当Cyrus SASL认证方法启用时,Postfix SMTP Server为每个SMTP会话创建了一个SASL句柄,在关闭SMTP连接前会一直使用此句柄。根据Cyrus SASL include源文件的注释,服务器在客户端验证失败后不应重新使用Cyrus SASL服务器,而应
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2011-1720

#POC DescriptionSource LinkShenlong Link
1Exploit of CVE-2011-1720.https://github.com/nbeguier/postfix_exploitPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2011-1720

登录查看更多情报信息。

Same Patch Batch · n/a · 2011-05-13 · 41 CVEs total

CVE-2011-1849HP 3COM/H3C Intelligent Management Center tftpserver WRQ远程代码执行漏洞
CVE-2011-1248Microsoft WINS服务响应失败数据重用漏洞
CVE-2011-1269Microsoft Office PowerPoint文件解析内存破坏RCE漏洞
CVE-2011-1270Microsoft Office PowerPoint远程代码执行漏洞
CVE-2011-1325Lockon EC-CUBE跨站请求伪造漏洞
CVE-2011-1737HP Palm webOS多个跨站脚本攻击漏洞
CVE-2011-1738HP Palm WebOS本地权限提升漏洞
CVE-2011-1772Apache Struts XWork '<s:submit>'错误页面跨站脚本攻击漏洞
CVE-2011-1840MartiniCreations PassmanLite密码管理应用程序敏感信息泄露漏洞
CVE-2011-1848HP 3COM/H3C Intelligent Management Center img.exe组件栈缓冲区溢出漏洞
CVE-2011-0995Novell SUSE Linux Enterprise Server rubygem-sqlite3包权限提升漏洞
CVE-2011-1850HP 3COM/H3C Intelligent Management Center dbman sprintf栈缓冲区溢出漏洞
CVE-2011-1851HP 3COM/H3C Intelligent Management Center tftpserver mode栈缓冲区溢出漏洞
CVE-2011-1852HP 3COM/H3C Intelligent Management Center tftpserver DATA/ERROR栈缓冲区溢出漏洞
CVE-2011-1853HP 3COM/H3C Intelligent Management Center tftpserver opcode_table远程代码执行漏洞
CVE-2011-1854HP 3COM/H3C Intelligent Management Center imcsyslogdm释放后使用漏洞
CVE-2011-1855HP Network Node Manager i数据和日志文件信息泄露漏洞
CVE-2011-2087Apache Struts javatemplates插件组件处理程序多个跨站脚本攻击漏洞
CVE-2011-2088Apache Struts和OpenSymphony WebWork Xwork敏感信息泄露漏洞
CVE-2011-2089ICONICS BizViz和GENESIS32 VersionInfo ActiveX控件栈缓冲区溢出漏洞

Showing top 20 of 41 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2011-1720

No comments yet


Leave a comment