vulnerability

Oracle Linux: CVE-2023-51764: ELSA-2024-9243: postfix security update (MODERATE)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Dec 18, 2023
Added
Nov 21, 2024
Modified
Dec 3, 2025

Description

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.
A flaw was found in some SMTP server configurations in Postfix. This flaw allows a remote attacker to break out email message data to "smuggle" SMTP commands and send spoofed emails that pass SPF checks.
Out of the box, Postfix targets to accommodate older clients with faulty SMTP implementations due to which restrictions are not enforced in the default configuration. Appropriate mitigation strategies are mentioned in the appropriate section below.

Solutions

oracle-linux-upgrade-postfixoracle-linux-upgrade-postfix-cdboracle-linux-upgrade-postfix-ldaporacle-linux-upgrade-postfix-lmdboracle-linux-upgrade-postfix-mysqloracle-linux-upgrade-postfix-pcreoracle-linux-upgrade-postfix-perl-scriptsoracle-linux-upgrade-postfix-pgsqloracle-linux-upgrade-postfix-sqlite
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.