CPANSA-Net-Server-Coro-2011-0411: Net-Server-Coro vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2011-03-16T00:00:00 Engine CSAF Perl Toolkit 0.25
Current release date 2011-03-16T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score Severity
Original language Language en
Also referred to

Vulnerability Description

Remaining contents of the read buffer could allow plaintext injection attacks wherein attackers could cause nominally SSL-only commands to be executed by appending them to the end of a STARTTLS.

Vulnerabilities

CVE-2011-0411

Vulnerability Description

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.

Weakness CWE-264 : Permissions, Privileges, and Access Controls

Product status

Known affected
Product Score
Net-Server-Coro less than 1.0
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
2.0 AV:N/AC:M/Au:N/C:P/I:P/A:P 6.8 Medium
Fixed

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Wed Mar 16 00:00:00 2011 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/