CVE-2003-0468 Affecting postfix package, versions <1.1.12


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
1.84% (89th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN9-POSTFIX-306650
  • published27 Aug 2003
  • disclosed27 Aug 2003

Introduced: 27 Aug 2003

CVE-2003-0468  (opens in a new tab)

How to fix?

Upgrade Debian:9 postfix to version 1.1.12 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream postfix package and not the postfix package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.

Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.

CVSS Scores

version 3.1