VULNERABILITY

Amazon Linux 2023: CVE-2023-51764: Important priority package update for postfix

Try Surface Command Get a continuous 360° view of your attack surface
Gartner Peer insights
4.4 Gartner Rating
Back to Search

Amazon Linux 2023: CVE-2023-51764: Important priority package update for postfix

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
12/18/2023
Created
02/14/2025
Added
02/17/2025
Modified
02/17/2025

Description

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9. A flaw was found in some SMTP server configurations in Postfix. This flaw allows a remote attacker to break out email message data to "smuggle" SMTP commands and send spoofed emails that pass SPF checks. Out of the box, Postfix targets to accommodate older clients with faulty SMTP implementations due to which restrictions are not enforced in the default configuration. Appropriate mitigation strategies are mentioned in the appropriate section below.

Solution(s)

  • amazon-linux-2023-upgrade-postfix
  • amazon-linux-2023-upgrade-postfix-cdb
  • amazon-linux-2023-upgrade-postfix-cdb-debuginfo
  • amazon-linux-2023-upgrade-postfix-debuginfo
  • amazon-linux-2023-upgrade-postfix-debugsource
  • amazon-linux-2023-upgrade-postfix-ldap
  • amazon-linux-2023-upgrade-postfix-ldap-debuginfo
  • amazon-linux-2023-upgrade-postfix-lmdb
  • amazon-linux-2023-upgrade-postfix-lmdb-debuginfo
  • amazon-linux-2023-upgrade-postfix-mysql
  • amazon-linux-2023-upgrade-postfix-mysql-debuginfo
  • amazon-linux-2023-upgrade-postfix-pcre
  • amazon-linux-2023-upgrade-postfix-pcre-debuginfo
  • amazon-linux-2023-upgrade-postfix-perl-scripts
  • amazon-linux-2023-upgrade-postfix-pgsql
  • amazon-linux-2023-upgrade-postfix-pgsql-debuginfo
  • amazon-linux-2023-upgrade-postfix-sqlite
  • amazon-linux-2023-upgrade-postfix-sqlite-debuginfo

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial WATCH DEMO

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;