Vulnerabilities > CVE-2011-1431 - Unspecified vulnerability in Frederik Vermeulen Netqmail 1.06
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN frederik-vermeulen
nessus
Summary
The STARTTLS implementation in qmail-smtpd.c in qmail-smtpd in the netqmail-1.06-tls patch for netqmail 1.06 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | SMTP problems |
NASL id | SMTP_STARTTLS_PLAINTEXT_INJECTION.NASL |
description | The remote SMTP service contains a software flaw in its STARTTLS implementation that could allow a remote, unauthenticated attacker to inject commands during the plaintext protocol phase that will be executed during the ciphertext protocol phase. Successful exploitation could allow an attacker to steal a victim |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 52611 |
published | 2011-03-10 |
reporter | This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/52611 |
title | SMTP Service STARTTLS Plaintext Command Injection |
code |
|
References
- http://inoa.net/qmail-tls/vu555316.patch
- http://securityreason.com/securityalert/8144
- http://www.kb.cert.org/vuls/id/555316
- http://www.kb.cert.org/vuls/id/MAPG-8D9M5Q
- http://www.postfix.org/CVE-2011-0411.html
- http://www.securityfocus.com/archive/1/516901
- http://www.securityfocus.com/bid/46767
- http://www.vupen.com/english/advisories/2011/0612
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65932
- http://inoa.net/qmail-tls/vu555316.patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65932
- http://www.vupen.com/english/advisories/2011/0612
- http://www.securityfocus.com/bid/46767
- http://www.securityfocus.com/archive/1/516901
- http://www.postfix.org/CVE-2011-0411.html
- http://www.kb.cert.org/vuls/id/MAPG-8D9M5Q
- http://www.kb.cert.org/vuls/id/555316
- http://securityreason.com/securityalert/8144