USN-174-1: courier vulnerability
26 August 2005
courier vulnerability
Releases
Details
A Denial of Service vulnerability has been discovered in the Courier
mail server. Due to a flawed status code check, failed DNS (domain
name service) queries for SPF (sender policy framework) were not
handled properly and could lead to memory corruption. A malicious DNS
server could exploit this to crash the Courier server.
However, SPF is not enabled by default, so you are only vulnerable if
you explicitly enabled it.
The Ubuntu 4.10 version of courier is not affected by this.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 5.04
-
courier-base
-
In general, a standard system update will make all the necessary changes.