Hi all,
I received notification that my Plesk server uses an affected version of libSPF2 for email, but I can't find it by : rpm -qa|grep -i libspf2
However the test conclusively determine that my Plesk runs the vulnerable version of libSPF2 , I am not sure if Plesk is using similar technology of libspf2 or something else, so I don't know how to fix it.
Can Plesk developer and engineer take a look on it? It is quite dangerous that it can even facilitate a Remote Code Execution attack according to its description.
CentOS 7.4.1708
Plesk Obsidian Version 18.0.36
postfix-3.5.9-2.centos.7+p18.0.36.0+t210604.1022.x86_64
psa-mail-driver-common-18.0-2.centos.7+p18.0.36.0+t210604.1022.x86_64
Ming
I received notification that my Plesk server uses an affected version of libSPF2 for email, but I can't find it by : rpm -qa|grep -i libspf2
However the test conclusively determine that my Plesk runs the vulnerable version of libSPF2 , I am not sure if Plesk is using similar technology of libspf2 or something else, so I don't know how to fix it.
Can Plesk developer and engineer take a look on it? It is quite dangerous that it can even facilitate a Remote Code Execution attack according to its description.
IMAAL
imaal.byu.edu
CentOS 7.4.1708
Plesk Obsidian Version 18.0.36
postfix-3.5.9-2.centos.7+p18.0.36.0+t210604.1022.x86_64
psa-mail-driver-common-18.0-2.centos.7+p18.0.36.0+t210604.1022.x86_64
Ming