6.8

CVE-2011-0411

Exploit

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PostfixPostfix Version2.4
PostfixPostfix Version2.4.0
PostfixPostfix Version2.4.1
PostfixPostfix Version2.4.2
PostfixPostfix Version2.4.3
PostfixPostfix Version2.4.4
PostfixPostfix Version2.4.5
PostfixPostfix Version2.4.6
PostfixPostfix Version2.4.7
PostfixPostfix Version2.4.8
PostfixPostfix Version2.4.9
PostfixPostfix Version2.4.10
PostfixPostfix Version2.4.11
PostfixPostfix Version2.4.12
PostfixPostfix Version2.4.13
PostfixPostfix Version2.4.14
PostfixPostfix Version2.4.15
PostfixPostfix Version2.5.0
PostfixPostfix Version2.5.1
PostfixPostfix Version2.5.2
PostfixPostfix Version2.5.3
PostfixPostfix Version2.5.4
PostfixPostfix Version2.5.5
PostfixPostfix Version2.5.6
PostfixPostfix Version2.5.7
PostfixPostfix Version2.5.8
PostfixPostfix Version2.5.9
PostfixPostfix Version2.5.10
PostfixPostfix Version2.5.11
PostfixPostfix Version2.6
PostfixPostfix Version2.6.0
PostfixPostfix Version2.6.1
PostfixPostfix Version2.6.2
PostfixPostfix Version2.6.3
PostfixPostfix Version2.6.4
PostfixPostfix Version2.6.5
PostfixPostfix Version2.6.6
PostfixPostfix Version2.6.7
PostfixPostfix Version2.6.8
PostfixPostfix Version2.7.0
PostfixPostfix Version2.7.1
PostfixPostfix Version2.7.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 72.47% 0.987
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P