Am 10.02.2011 22:26, schrieb Patrick Ben Koetter:
> * Mark Martinec <mark.martinec...@ijs.si>:
>> On Thursday February 10 2011 21:14:59 Adam Katz wrote:
>>> Does this affect sendmail as well as postfix?  I assume so,
>>> but wanted an explicit confirmation.
>>
>> Yes, the security hole is entirely within the milter,
>> independent of the MTA.
> 
> I tried the exploit and it seems that Postfix' restrictions that check for 
> FQDN
> address and correct recipient syntax prevent the exploit from getting through:
> 
> telnet mail.example.de 25
> 220 mail.example.de ESMTP Postfix
> HELO foo
> 250 mail.example.de
> MAIL FROM:<>
> 250 2.1.0 Ok
> RCPT TO:root+:"|touch /tmp/foo"
> 501 5.1.3 Bad recipient address syntax
> RCPT TO:<root+:"|touch /tmp/foo">
> 504 5.5.2 <root+:|touch /tmp/foo>: Recipient address rejected: need 
> fully-qualified address
> RCPT TO:<root@localhost+:"|touch /tmp/foo">
> 501 5.1.3 Bad recipient address syntax
> QUIT
> 221 2.0.0 Bye
> 
> Can anyone confirm this?
> 
> p@rick
> 
> 
 Hi Patrick the Problem was fixed last year, as far i know,

it never worked with default postfix settings
also the x switch isnt wide used

http://savannah.nongnu.org/bugs/?29136
-- 
Best Regards

MfG Robert Schetterer

Germany/Munich/Bavaria

Reply via email to