CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
98.8%
Some STARTTLS implementations could allow a remote attacker to inject commands during the plaintext phase of the protocol.
STARTTLS is an extension to plaintext communication protocols that offers a way to upgrade a plaintext connection to an encrypted (TLS or SSL) connection instead of using a separate port for encrypted communication. Some implementations of STARTTLS contain a vulnerability that could allow a remote unauthenticated attacker to inject commands during the plaintext protocol phase, that will be executed during the ciphertext protocol phase. This vulnerability is caused by the switch from plaintext to TLS being implemented below the application’s I/O buffering layer.This issue is only of practical concern for affected implementations that also perform correct certificate validation. Implementations which do not perform certificate validation are already inherently vulnerable to man-in-the-middle attacks.
Update
Purge the application I/O buffer
555316
Filter by status: All Affected Not Affected Unknown
Filter by content: __Additional information available
__Sort by: Status Alphabetical
Expand all
Javascript is disabled. Clickhere to view vendors.
Updated: May 17, 2011
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: May 11, 2011
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 21, 2011 Updated: March 01, 2011
Affected
We will work on addressing this vulnerability in an upcoming release of IMail.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: March 01, 2011
Affected
We are going to resolve the issue in the next product version.
We are not aware of further vendor information regarding this vulnerability.
Updated: March 03, 2011
Affected
Postfix legacy releases 2.7.3, 2.6.9, 2.5.12 and 2.4.16 are available.
These releases contain a fix for CVE-2011-0411 which allows plaintext
command injection with SMTP sessions over TLS. This defect was
introduced with Postfix version 2.2.
Postfix 2.8 and 2.9 are not affected.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: March 07, 2011
Affected
We have not received a statement from the vendor.
Q-Mail has released a patch to address this vulnerability.
Note that Qmail-TLS is a third-party extension for the qmail software.
Because STARTTLS is not supported by default in either the original qmail distribution or the netqmail distribution, those distributions are not vulnerable to this issue.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Notified: January 19, 2011 Updated: April 07, 2011
Affected
Vulnerable. This issue affects postfix packages in Red Hat Enterprise
Linux 4, 5, and 6. The Red Hat Security Response Team has rated this
issue as having moderate security impact, a future update will address
this flaw.
This issue did not affect the versions of the sendmail package as shipped
with Red Hat Enterprise Linux 3, 4, 5, or 6, as Sendmail by switching to
SMTP over TLS replaces the entire received SMTP commands stream, along
with its read/write buffers and read/write functions.
This issue did not affect the versions of the exim package as shipped
with Red Hat Enterprise Linux 4 and 5, as Exim by switching to SMTP over
TLS replaces plaintext read/write functions with TLS read/write functions.
Red Hat has released updated postfix packages, for:
Red Hat Enterprise Linux 4 and 5:
* https://rhn.redhat.com/errata/RHSA-2011-0422.html
* https://bugzilla.redhat.com/show_bug.cgi?id=674814#c26
Red Hat Enterprise Linux 6:
* https://rhn.redhat.com/errata/RHSA-2011-0423.html
* https://bugzilla.redhat.com/show_bug.cgi?id=674814#c27
http://www.redhat.com/security/data/cve/CVE-2011-0411.html
https://rhn.redhat.com/errata/RHSA-2011-0422.html
https://bugzilla.redhat.com/show_bug.cgi?id=674814#c26
https://rhn.redhat.com/errata/RHSA-2011-0423.html
https://bugzilla.redhat.com/show_bug.cgi?id=674814#c27
There are no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Notified: January 19, 2011 Updated: March 01, 2011
Affected
The issue is being fixed in affected products and would be announced in a quarterly Oracle Critical Patch update.
We are not aware of further vendor information regarding this vulnerability.
Updated: May 11, 2011
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: April 14, 2011
Affected
TLS Command Injection Vulnerability: A TLS Hotfix is available for XCS version 9.0 and 9.1 to resolve a potential command injection vulnerability in the TLS over SMTP implementation. The vulnerability makes it possible to allow a man-in-the-middle to inject commands during the plaintext protocol phase, that would be executed during the ciphertext protocol phase. A full description of the vulnerability is described in CERT Vulnerability Note VU#555316. This fix
is included in the XCS 9.0 Update 1 as well as the XCS 9.1 TLS Hotfix updates
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: March 28, 2011
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: March 07, 2011 Updated: March 14, 2011
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: July 22, 2011
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: March 16, 2011
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: March 14, 2011
Not Affected
GTA’s GB-OS based firewalls are not affected by this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: March 07, 2011 Updated: March 14, 2011
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: March 15, 2011
Not Affected
No NetApp Data ONTAP® products are vulnerable to this issue.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: March 03, 2011
Not Affected
Our GroupWise Engineering team does not feel that we are vulnerable to this issue
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: March 01, 2011
Not Affected
We are not vulnerable to it.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: September 08, 2011
Not Affected
The SCOoffice 4.2 product we ship does not currently support TLS and the product is not vulnerable for this reason.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: March 14, 2011
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 27, 2011 Updated: January 27, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: March 14, 2011 Updated: March 14, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: March 07, 2011 Updated: March 07, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: March 07, 2011 Updated: March 07, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 19, 2011 Updated: January 19, 2011
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
View all 82 vendors __View less vendors __
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Wietse Venema for reporting this vulnerability.
This document was written by Michael Orlando.
CVE IDs: | CVE-2011-0411, CVE-2011-1430, CVE-2011-1431, CVE-2011-1432, CVE-2011-1575 |
---|---|
Severity Metric: | 1.39 Date Public: |