Vulnerability Description
In s/qmail through 4.0.07, an active MitM can inject arbitrary plaintext commands into a STARTTLS encrypted session between an SMTP client and s/qmail. This allows e-mail messages and user credentials to be sent to the MitM attacker.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fehcom | S\/Qmail | <= 4.0.07 |
Related Weaknesses (CWE)
References
- https://nostarttls.secvuln.info/Technical DescriptionThird Party Advisory
- https://www.fehcom.de/sqmail/sqmail.htmlPatchRelease NotesVendor Advisory
- https://nostarttls.secvuln.info/Technical DescriptionThird Party Advisory
- https://www.fehcom.de/sqmail/sqmail.htmlPatchRelease NotesVendor Advisory
FAQ
What is CVE-2020-15955?
CVE-2020-15955 is a vulnerability with a CVSS score of 5.9 (MEDIUM). In s/qmail through 4.0.07, an active MitM can inject arbitrary plaintext commands into a STARTTLS encrypted session between an SMTP client and s/qmail. This allows e-mail messages and user credentials...
How severe is CVE-2020-15955?
CVE-2020-15955 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-15955?
Check the references section above for vendor advisories and patch information. Affected products include: Fehcom S\/Qmail.