Vulnerability Description
The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipswitch | Imail | All versions |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/43676Vendor Advisory
- http://www.kb.cert.org/vuls/id/555316US Government Resource
- http://www.kb.cert.org/vuls/id/MAPG-8DBRD4US Government Resource
- http://www.osvdb.org/71020
- http://www.securityfocus.com/bid/46767
- http://www.vupen.com/english/advisories/2011/0609Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65932
- http://secunia.com/advisories/43676Vendor Advisory
- http://www.kb.cert.org/vuls/id/555316US Government Resource
- http://www.kb.cert.org/vuls/id/MAPG-8DBRD4US Government Resource
- http://www.osvdb.org/71020
- http://www.securityfocus.com/bid/46767
- http://www.vupen.com/english/advisories/2011/0609Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65932
FAQ
What is CVE-2011-1430?
CVE-2011-1430 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP ...
How severe is CVE-2011-1430?
CVE-2011-1430 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1430?
Check the references section above for vendor advisories and patch information. Affected products include: Ipswitch Imail.