qmail-verify as used in netqmail 1.06 is prone to a mail-address verification bypass vulnerability.
The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Link | Tags |
---|---|
https://www.openwall.com/lists/oss-security/2020/05/19/8 | mailing list patch exploit third party advisory |
https://bugs.debian.org/961060 | issue tracking third party advisory |
https://www.debian.org/security/2020/dsa-4692 | third party advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00002.html | third party advisory mailing list |
https://usn.ubuntu.com/4556-1/ | third party advisory vendor advisory |