Skip to content

High severity vulnerability that affects postfix-mta-sts-resolver

High severity GitHub Reviewed Published Jun 13, 2019 in Snawoot/postfix-mta-sts-resolver • Updated Jan 9, 2023

Package

pip postfix-mta-sts-resolver (pip)

Affected versions

< 0.5.1

Patched versions

0.5.1

Description

Incorrect query parsing

Impact

All users of versions prior to 0.5.1 can receive incorrect response from daemon under rare conditions, rendering downgrade of effective STS policy.

Patches

Problem has been patched in version 0.5.1

Workarounds

Users may remediate this vulnerability without upgrading by applying these patches to older suppoorted versions.

For more information

If you have any questions or comments about this advisory:

References

Published to the GitHub Advisory Database Jul 5, 2019
Reviewed Jun 16, 2020
Last updated Jan 9, 2023

Severity

High

EPSS score

0.105%
(44th percentile)

Weaknesses

CVE ID

CVE-2019-16791

GHSA ID

GHSA-h92m-42h4-82f6

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.