srs2.c in PostSRSd before 1.10 allows remote attackers to cause a denial of service (CPU consumption) via a long timestamp tag in an SRS address.
The product performs an iteration or loop without sufficiently limiting the number of times that the loop is executed.
Link | Tags |
---|---|
https://github.com/roehling/postsrsd/commit/4733fb11f6bec6524bb8518c5e1a699288c26bac | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2020/12/msg00031.html | third party advisory mailing list |
https://security.gentoo.org/glsa/202107-08 | third party advisory vendor advisory |