6.3 Medium
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.026 Low
EPSS
Percentile
90.4%
Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct “bounce scans” or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a “!” string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000717
marc.info/?l=bugtraq&m=106001525130257&w=2
secunia.com/advisories/9433
www.debian.org/security/2003/dsa-363
www.mandriva.com/security/advisories?name=MDKSA-2003:081
www.novell.com/linux/security/advisories/2003_033_postfix.html
www.redhat.com/support/errata/RHSA-2003-251.html
www.securityfocus.com/bid/8333
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A522