6.8

CVE-2011-0411

Exploit
The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PostfixPostfix Version2.4
PostfixPostfix Version2.4.0
PostfixPostfix Version2.4.1
PostfixPostfix Version2.4.2
PostfixPostfix Version2.4.3
PostfixPostfix Version2.4.4
PostfixPostfix Version2.4.5
PostfixPostfix Version2.4.6
PostfixPostfix Version2.4.7
PostfixPostfix Version2.4.8
PostfixPostfix Version2.4.9
PostfixPostfix Version2.4.10
PostfixPostfix Version2.4.11
PostfixPostfix Version2.4.12
PostfixPostfix Version2.4.13
PostfixPostfix Version2.4.14
PostfixPostfix Version2.4.15
PostfixPostfix Version2.5.0
PostfixPostfix Version2.5.1
PostfixPostfix Version2.5.2
PostfixPostfix Version2.5.3
PostfixPostfix Version2.5.4
PostfixPostfix Version2.5.5
PostfixPostfix Version2.5.6
PostfixPostfix Version2.5.7
PostfixPostfix Version2.5.8
PostfixPostfix Version2.5.9
PostfixPostfix Version2.5.10
PostfixPostfix Version2.5.11
PostfixPostfix Version2.6
PostfixPostfix Version2.6.0
PostfixPostfix Version2.6.1
PostfixPostfix Version2.6.2
PostfixPostfix Version2.6.3
PostfixPostfix Version2.6.4
PostfixPostfix Version2.6.5
PostfixPostfix Version2.6.6
PostfixPostfix Version2.6.7
PostfixPostfix Version2.6.8
PostfixPostfix Version2.7.0
PostfixPostfix Version2.7.1
PostfixPostfix Version2.7.2
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 42.7% 0.975
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
Es wurden noch keine Informationen zu CWE veröffentlicht.