Format string vulnerability in the log function in Net::Server 0.87 and earlier, as used in Postfix Greylisting Policy Server (Postgrey) 1.18 and earlier, and possibly other products, allows remote attackers to cause a denial of service (crash) via format string specifiers that are not properly handled before being sent to syslog, as demonstrated using sender addresses to Postgrey.
Link | Tags |
---|---|
http://www.gentoo.org/security/en/glsa/glsa-200608-18.xml | vendor advisory |
http://www.debian.org/security/2006/dsa-1122 | vendor advisory |
http://secunia.com/advisories/21452 | third party advisory |
http://lists.ee.ethz.ch/postgrey/msg00630.html | mailing list |
http://www.osvdb.org/15517 | vdb entry |
http://secunia.com/advisories/21164 | third party advisory |
http://marc.info/?l=full-disclosure&m=111354538331167&w=2 | mailing list |
http://secunia.com/advisories/21152 | third party advisory |
http://lists.ee.ethz.ch/postgrey/msg00627.html | mailing list |
http://secunia.com/advisories/21149 | third party advisory |
http://lists.ee.ethz.ch/postgrey/msg00647.html | mailing list patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/20108 | vdb entry |
http://www.debian.org/security/2006/dsa-1121 | vendor advisory |
http://secunia.com/advisories/14958 | third party advisory patch |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:131 | vendor advisory |
http://www.securityfocus.com/bid/13193 | vdb entry |