CVE-2011-1430

The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ipswitch:imail:*:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:*:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:5.0:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.00:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.0:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.1:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.2:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.3:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.4:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.06:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:7.1:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:7.12:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:8.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:8.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:8.1:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:8.01:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:8.11:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:8.12:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:8.13:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:8.22:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:10:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:10.01:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:10.02:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:11:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:11.01:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:11.02:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:2006:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:2006.1:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:2006.2:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:server_8.2_hotfix_2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:26

Type Values Removed Values Added
References () http://secunia.com/advisories/43676 - Vendor Advisory () http://secunia.com/advisories/43676 - Vendor Advisory
References () http://www.kb.cert.org/vuls/id/555316 - US Government Resource () http://www.kb.cert.org/vuls/id/555316 - US Government Resource
References () http://www.kb.cert.org/vuls/id/MAPG-8DBRD4 - US Government Resource () http://www.kb.cert.org/vuls/id/MAPG-8DBRD4 - US Government Resource
References () http://www.osvdb.org/71020 - () http://www.osvdb.org/71020 -
References () http://www.securityfocus.com/bid/46767 - () http://www.securityfocus.com/bid/46767 -
References () http://www.vupen.com/english/advisories/2011/0609 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0609 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/65932 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/65932 -

Information

Published : 2011-03-16 22:55

Updated : 2024-11-21 01:26


NVD link : CVE-2011-1430

Mitre link : CVE-2011-1430

CVE.ORG link : CVE-2011-1430


JSON object : View

Products Affected

ipswitch

  • imail
CWE
CWE-20

Improper Input Validation