2 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

authpam.c in courier-authdaemon for Courier Mail Server 0.37.3 through 0.52.1, when using pam_tally, does not call the pam_acct_mgmt function to verify that access should be granted, which allows attackers to authenticate to the server using accounts that have been disabled. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=211920 http://secunia.com/advisories/17919 http://secunia.com/advisories/17999 http://www.debian.org/security/2005/dsa-917 http://www.securityfocus.com/bid/15771 https://exchange.xforce.ibmcloud.com/vulnerabilities/23532 https://usn.ubuntu.com/226-1 •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

spf.c in Courier Mail Server does not properly handle DNS failures when looking up Sender Policy Framework (SPF) records, which could allow attackers to cause memory corruption. • http://secunia.com/advisories/15901 http://www.courier-mta.org/?changelog.html •