U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-51764

Change History

New CVE Received by NIST 12/24/2023 12:15:08 AM

Action Type Old Value New Value
Added Description

								
							
							
						
Postfix through 3.8.4 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages that appear to originate from the Postfix server, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required: the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.
Added Reference

								
							
							
						
MITRE https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ [No types assigned]
Added Reference

								
							
							
						
MITRE https://www.postfix.org/smtp-smuggling.html [No types assigned]