• If you are still using CentOS 7.9, it's time to convert to Alma 8 with the free centos2alma tool by Plesk or Plesk Migrator. Please let us know your experiences or concerns in this thread:
    CentOS2Alma discussion

Resolved Smtp Smuggling advisory

I asked Plesk support this same question about our servers, here is their answer received today:

Thank you for waiting, we've got an update from Security Team.
Indeed, Plesk servers are affected by this vulnerability.
Plesk ships own Postfix 3.5.x packages for RHEL<=8 (and its forks) and Ubuntu 18. For other OSes Postfix is installed from OS vendor repositories.
The vulnerability fix for packages shipped by us is expected next week. Release for other operating systems depend on OS vendors. We are also considering to include necessary configuration changes for fixed versions.

Until security fix is released please consider applying short-term workaround suggested by Postfix SMTP Smuggling
  1. Connect to the server via SSH.
  2. Check Postfix version - first line of the output:
    # postconf -d | grep mail_version
  3. Change the following directives by editing /etc/postfix/main.cf configuration file:
    • With all Postfix versions:
      smtpd_data_restrictions = reject_unauth_pipelining
      smtpd_discard_ehlo_keywords = chunking, silent-discard
    • Postfix 3.9, 3.8.1, 3.7.6, 3.6.10 and 3.5.20:
      smtpd_forbid_unauth_pipelining = yes
      smtpd_discard_ehlo_keywords = chunking, silent-discard
 
I asked Plesk support this same question about our servers, here is their answer received today:

Thank you for waiting, we've got an update from Security Team.
Indeed, Plesk servers are affected by this vulnerability.
Plesk ships own Postfix 3.5.x packages for RHEL<=8 (and its forks) and Ubuntu 18. For other OSes Postfix is installed from OS vendor repositories.
The vulnerability fix for packages shipped by us is expected next week. Release for other operating systems depend on OS vendors. We are also considering to include necessary configuration changes for fixed versions.

Until security fix is released please consider applying short-term workaround suggested by Postfix SMTP Smuggling
  1. Connect to the server via SSH.
  2. Check Postfix version - first line of the output:
    # postconf -d | grep mail_version
  3. Change the following directives by editing /etc/postfix/main.cf configuration file:
    • With all Postfix versions:
      smtpd_data_restrictions = reject_unauth_pipelining
      smtpd_discard_ehlo_keywords = chunking, silent-discard
    • Postfix 3.9, 3.8.1, 3.7.6, 3.6.10 and 3.5.20:
      smtpd_forbid_unauth_pipelining = yes
      smtpd_discard_ehlo_keywords = chunking, silent-discard
Thank you very much for answer.

Meanwhile I have applied the fix which is applicable for all Postfix versions. I am curious, when the postfix 3.5.x package is available. In Ubuntu 20.04.6 LTS only postfix 3.4.13 is included. The above mentioned fix is not fully adressing the vulnerability.

Workarounds:

"NOTE: this will block misuse of SMTP command pipelining.It will not block message pipelining (multiple MAIL transactionsper session), nor will it block a malformed end of line. Malformedline endings are addressed with the long-term solution."
 
Back
Top