CVE-2005-0337
Published May 2, 2005
Last updated 7 years ago
Overview
- Description
- Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:wietse_venema:postfix:2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13948D17-79FA-45FF-8820-5A833EB4D36C" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9440B25-D206-4914-9557-B5F030890DEC" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9933557-3BCA-4D92-AD4F-27758A0D3347" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10A60552-15A5-4E95-B3CE-99A4B26260C1" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D74A418-50F0-42C0-ABBC-BBBE718FF025" }, { "criteria": "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28CD54FE-D682-4063-B7C3-8B29B26B39AD" }, { "criteria": "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37F124FE-15F1-49D7-9E03-8E036CE1A20C" }, { "criteria": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8C55338-3372-413F-82E3-E1B476D6F41A" }, { "criteria": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56EF103F-5668-4754-A83B-D3662D0CE815" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFABFCE5-4F86-4AE8-9849-BC360AC72098" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C" } ], "operator": "OR" } ] } ]