ID

VAR-201103-0090


CVE

CVE-2011-1430


TITLE

STARTTLS plaintext command injection vulnerability

Trust: 0.8

sources: CERT/CC: VU#555316

DESCRIPTION

The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. Some STARTTLS implementations could allow a remote attacker to inject commands during the plaintext phase of the protocol. This vulnerability is related to plain text command injection attacks. An attacker can exploit this issue to execute arbitrary commands in the context of the user running the application. Successful exploits can allow attackers to obtain email usernames and passwords. The following vendors are affected: Ipswitch Kerio Postfix Qmail-TLS Oracle (note that the affected application is unknown) SCO Group spamdyke ISC. Ipswitch IMail Server is an American Ipswitch company's mail server running on the Microsoft Windows operating system. SOLUTION: Restrict access to trusted hosts only. PROVIDED AND/OR DISCOVERED BY: Wietse Venema via US-CERT. ---------------------------------------------------------------------- Alerts when vulnerabilities pose a threat to your infrastructure The enhanced reporting module of the Secunia Vulnerability Intelligence Manager (VIM) enables you to combine advisory and ticket information, and generate policy compliance statistics. Using your asset list preferences, customised notifications are issued as soon as a new vulnerability is discovered - a valuable tool for documenting mitigation strategies. SOLUTION: Apply fixes. ---------------------------------------------------------------------- Get a tax break on purchases of Secunia Solutions! If you are a U.S. company, you may be qualified for a tax break for your software purchases. Learn more at: http://secunia.com/products/corporate/vim/section_179/ ---------------------------------------------------------------------- TITLE: Kerio Connect "STARTTLS" Plaintext Injection Vulnerability SECUNIA ADVISORY ID: SA43678 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43678/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43678 RELEASE DATE: 2011-03-12 DISCUSS ADVISORY: http://secunia.com/advisories/43678/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/43678/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=43678 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Kerio Connect, which can be exploited by malicious people to manipulate certain data. The vulnerability is caused due to the TLS implementation not properly clearing transport layer buffers when upgrading from plaintext to ciphertext after receiving the "STARTTLS" command. This can be exploited to insert arbitrary plaintext data (e.g. SMTP commands) during the plaintext phase, which will then be executed after upgrading to the TLS ciphertext phase. The vulnerability is reported in version 7.1.4 build 2985. Other versions may also be affected. SOLUTION: Reportedly, the vendor will fix this in an upcoming version. PROVIDED AND/OR DISCOVERED BY: Wietse Venema ORIGINAL ADVISORY: US-CERT VU#555316: http://www.kb.cert.org/vuls/id/555316 http://www.kb.cert.org/vuls/id/MAPG-8D9M4P OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.06

sources: NVD: CVE-2011-1430 // CERT/CC: VU#555316 // JVNDB: JVNDB-2011-004393 // BID: 46767 // VULHUB: VHN-49375 // PACKETSTORM: 104917 // PACKETSTORM: 101909 // PACKETSTORM: 99104 // PACKETSTORM: 99217

AFFECTED PRODUCTS

vendor:ipswitchmodel:imailscope:eqversion:7.0.5

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:5.0.5

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:7.0.2

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:7.0.3

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:5.0.6

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:7.0.4

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:5.0

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:2006.2

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:6.0.1

Trust: 1.9

vendor:ipswitchmodel:imailscope:lteversion:11.03

Trust: 1.8

vendor:ipswitchmodel:imailscope:eqversion:2006

Trust: 1.6

vendor:ipswitchmodel:imailscope:eqversion:6.1

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:8.22

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.2

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:8.01

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:7.0.1

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:8.11

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:5.0.8

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:8.13

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.4

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:8.0.3

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:7.12

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:8.0.5

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.3

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:8.1

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.4

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.0

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:7.0.7

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.6

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.5

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.3

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:7.1

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:5.0.7

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.2

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:7.0.6

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:11.02

Trust: 1.0

vendor:ipswitchmodel:imailscope:eqversion:10.02

Trust: 1.0

vendor:ipswitchmodel:imailscope:eqversion:2006.1

Trust: 1.0

vendor:ipswitchmodel:imailscope:eqversion:10.01

Trust: 1.0

vendor:ipswitchmodel:imailscope:eqversion:6.00

Trust: 1.0

vendor:ipswitchmodel:imailscope:eqversion:6.06

Trust: 1.0

vendor:ipswitchmodel:imailscope:eqversion:server_8.2_hotfix_2

Trust: 1.0

vendor:ipswitchmodel:imailscope:eqversion:10

Trust: 1.0

vendor:ipswitchmodel:imailscope:eqversion:11

Trust: 1.0

vendor:ipswitchmodel:imailscope:eqversion:*

Trust: 1.0

vendor:ipswitchmodel:imailscope:eqversion:8.12

Trust: 1.0

vendor:ipswitchmodel:imailscope:eqversion:11.01

Trust: 1.0

vendor:cyrus imapmodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:ipswitchmodel: - scope: - version: -

Trust: 0.8

vendor:keriomodel: - scope: - version: -

Trust: 0.8

vendor:postfixmodel: - scope: - version: -

Trust: 0.8

vendor:qmail tlsmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:watchguardmodel: - scope: - version: -

Trust: 0.8

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.3.1

Trust: 0.3

vendor:spamdykemodel:spamdykescope:neversion:4.2.1

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.7.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.7

Trust: 0.3

vendor:cyrusmodel:imap serverscope:eqversion:2.4

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.5.4

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:susemodel:linux enterprise sp3scope:eqversion:10

Trust: 0.3

vendor:kolabmodel:groupware server 2.2-rc3scope: - version: -

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.6

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.4.9

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.3

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.5.5

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.1.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.8

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.3.2

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.2.3

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:pureftpdmodel:pure-ftpdscope:neversion:1.0.30

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.3

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:10.04

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.5

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:20011115

Trust: 0.3

vendor:kolabmodel:groupware server -rc2scope:eqversion:2.2

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2.3

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:sunmodel:java system messaging serverscope:eqversion:7.0

Trust: 0.3

vendor:keriomodel:mailserver patchscope:eqversion:6.7.01

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.2.2

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.5

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.1

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20110

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.5.2

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.6.3

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.3

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.1.3

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:4.0

Trust: 0.3

vendor:ipswitchmodel:imail hotfixscope:eqversion:8.22

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:keriomodel:mailserver patchscope:eqversion:6.6.23

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.2

Trust: 0.3

vendor:susemodel:linux enterprise sp2scope:eqversion:10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:pureftpdmodel:pure-ftpdscope:eqversion:1.0.29

Trust: 0.3

vendor:kolabmodel:groupware server 2.1.beta3scope: - version: -

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.0

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.3.3

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.4.1

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.3

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:kolabmodel:groupware serverscope:neversion:2.3.2

Trust: 0.3

vendor:iscmodel:innscope:neversion:2.5.3

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.8

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.10

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.4.8

Trust: 0.3

vendor:spamdykemodel:spamdykescope:eqversion:4.2

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:keriomodel:mailserver patchscope:eqversion:6.1.31

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:9.10

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.1

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.1

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.2

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.4

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.1

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:1.1.13

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:19991231

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:4.0

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.1

Trust: 0.3

vendor:cyrusmodel:imap serverscope:neversion:2.4.7

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.10

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.7

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.6.1

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.3.1

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.10

Trust: 0.3

vendor:keriomodel:connect buildscope:eqversion:7.1.42985

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2

Trust: 0.3

vendor:susemodel:linux enterprise sp4scope:eqversion:10

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.6.2

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.4.2

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.1

Trust: 0.3

vendor:kolabmodel:groupware server 2.1beta2scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.10

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.6-20080902

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:susemodel:linux enterprise sp1scope:eqversion:11

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:4.0

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.2

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.6

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:scomodel:scooffice serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.9

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.20

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.7

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.3.1

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.1

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:4.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.10

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.2

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:3.1

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2.2

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.1.3

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:1.1.12

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.10

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.2.4

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:1.1.11

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0.1

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:watchguardmodel:xcsscope:eqversion:9.1

Trust: 0.3

vendor:qmail smtpd authmodel:netqmailscope:eqversion:0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.4.0

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.14

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.10

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.4.1

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:1.0.21

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.0

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.1

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2.4

Trust: 0.3

vendor:sunmodel:java system messaging serverscope:eqversion:6.3

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:4.0

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:kolabmodel:groupware server 2.2-rc1scope: - version: -

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.10

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.6.5

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:message networking sp1scope:eqversion:5.2

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.8

Trust: 0.3

vendor:kolabmodel:groupware server beta3scope:eqversion:2.2

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.3

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.10

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.6

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:20010228

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.6.4

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.2

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.1.1

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:4.0

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:4.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.2

Trust: 0.3

vendor:ipswitchmodel:imail hotfixscope:eqversion:8.151

Trust: 0.3

vendor:cyrusmodel:imap serverscope:eqversion:2.4.6

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.2

Trust: 0.3

vendor:ietfmodel:starttlsscope:eqversion:0

Trust: 0.3

vendor:keriomodel:mailserver buildscope:eqversion:6.6.17069

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:7.0

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20090

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:messaging storage server sp3scope:eqversion:5.2

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:kolabmodel:groupware server beta1scope:eqversion:2.2

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.5

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:wietsemodel:venema postfix patchlevelscope:eqversion:2.5.44

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.2

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.1

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.4

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.7

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.4

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.2.10

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:19990906

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:9.10

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.1

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:4.0

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.6

Trust: 0.3

vendor:watchguardmodel:xcsscope:eqversion:9.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

sources: CERT/CC: VU#555316 // BID: 46767 // JVNDB: JVNDB-2011-004393 // CNNVD: CNNVD-201103-223 // NVD: CVE-2011-1430

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-1430
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#555316
value: 1.39

Trust: 0.8

NVD: CVE-2011-1430
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201103-223
value: MEDIUM

Trust: 0.6

VULHUB: VHN-49375
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-1430
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-49375
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#555316 // VULHUB: VHN-49375 // JVNDB: JVNDB-2011-004393 // CNNVD: CNNVD-201103-223 // NVD: CVE-2011-1430

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-49375 // JVNDB: JVNDB-2011-004393 // NVD: CVE-2011-1430

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201103-223

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201103-223

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-004393

PATCH

title:Top Pageurl:http://www.ipswitch.com/

Trust: 0.8

sources: JVNDB: JVNDB-2011-004393

EXTERNAL IDS

db:CERT/CCid:VU#555316

Trust: 4.0

db:NVDid:CVE-2011-1430

Trust: 2.8

db:BIDid:46767

Trust: 2.0

db:SECUNIAid:43676

Trust: 1.9

db:VUPENid:ADV-2011-0609

Trust: 1.7

db:OSVDBid:71020

Trust: 1.7

db:JVNDBid:JVNDB-2011-004393

Trust: 0.8

db:CNNVDid:CNNVD-201103-223

Trust: 0.7

db:XFid:65932

Trust: 0.6

db:SECUNIAid:45857

Trust: 0.2

db:SECUNIAid:44753

Trust: 0.2

db:SECUNIAid:43678

Trust: 0.2

db:VULHUBid:VHN-49375

Trust: 0.1

db:PACKETSTORMid:104917

Trust: 0.1

db:PACKETSTORMid:101909

Trust: 0.1

db:PACKETSTORMid:99104

Trust: 0.1

db:PACKETSTORMid:99217

Trust: 0.1

sources: CERT/CC: VU#555316 // VULHUB: VHN-49375 // BID: 46767 // JVNDB: JVNDB-2011-004393 // PACKETSTORM: 104917 // PACKETSTORM: 101909 // PACKETSTORM: 99104 // PACKETSTORM: 99217 // CNNVD: CNNVD-201103-223 // NVD: CVE-2011-1430

REFERENCES

url:http://www.kb.cert.org/vuls/id/555316

Trust: 3.2

url:http://www.kb.cert.org/vuls/id/mapg-8dbrd4

Trust: 1.8

url:http://www.securityfocus.com/bid/46767

Trust: 1.7

url:http://www.osvdb.org/71020

Trust: 1.7

url:http://secunia.com/advisories/43676

Trust: 1.7

url:http://www.vupen.com/english/advisories/2011/0609

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/65932

Trust: 1.1

url:http://tools.ietf.org/html/rfc2595

Trust: 0.8

url:http://tools.ietf.org/html/rfc3207

Trust: 0.8

url:http://tools.ietf.org/html/rfc4642

Trust: 0.8

url:https://bugzilla.redhat.com/show_bug.cgi?id=674814

Trust: 0.8

url:http://www.watchguard.com/archive/softwarecenter.asp

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1430

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1430

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/65932

Trust: 0.6

url:http://www.kb.cert.org/vuls/id/mapg-8d9m4p

Trust: 0.4

url:http://www.watchguard.com/support/release-notes/xcs/9/en-us/en_releasenotes_xcs_9_1_1/en_releasenotes_wg_xcs_9_1_tls_hotfix.pdf

Trust: 0.4

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.4

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.4

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.4

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.4

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.4

url:http://kolab.org/pipermail/kolab-announce/2011/000101.html

Trust: 0.3

url:http://bugzilla.cyrusimap.org/show_bug.cgi?id=3424

Trust: 0.3

url:http://cyrusimap.org/mediawiki/index.php/bugs_resolved_in_2.4.7

Trust: 0.3

url:https://www.isc.org/software/inn/2.5.3article

Trust: 0.3

url:http://files.kolab.org/server/release/kolab-server-2.3.2/sources/release-notes.txt

Trust: 0.3

url:http://www.postfix.org/cve-2011-0411.html

Trust: 0.3

url:http://www.pureftpd.org/project/pure-ftpd/news

Trust: 0.3

url:http://www.spamdyke.org/documentation/changelog.txt

Trust: 0.3

url:http://datatracker.ietf.org/doc/draft-josefsson-kerberos5-starttls/?include_text=1

Trust: 0.3

url:/archive/1/516901

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100134676

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100141041

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=850478

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html

Trust: 0.3

url:http://inoa.net/qmail-tls/vu555316.patch

Trust: 0.3

url:http://secunia.com/products/corporate/evm/

Trust: 0.3

url:http://secunia.com/products/corporate/vim/section_179/

Trust: 0.2

url:http://secunia.com/advisories/45857/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/blog/242

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=45857

Trust: 0.1

url:http://secunia.com/advisories/45857/#comments

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/mapg-8d9m6a

Trust: 0.1

url:http://secunia.com/advisories/44753/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/mapg-8d9m75

Trust: 0.1

url:http://www.youtube.com/user/secunia#p/a/u/0/m1y9sjqr2sy

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=44753

Trust: 0.1

url:http://secunia.com/advisories/44753/#comments

Trust: 0.1

url:http://secunia.com/advisories/43676/#comments

Trust: 0.1

url:http://secunia.com/advisories/43676/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43676

Trust: 0.1

url:http://secunia.com/advisories/43678/#comments

Trust: 0.1

url:http://secunia.com/advisories/43678/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43678

Trust: 0.1

sources: CERT/CC: VU#555316 // VULHUB: VHN-49375 // BID: 46767 // JVNDB: JVNDB-2011-004393 // PACKETSTORM: 104917 // PACKETSTORM: 101909 // PACKETSTORM: 99104 // PACKETSTORM: 99217 // CNNVD: CNNVD-201103-223 // NVD: CVE-2011-1430

CREDITS

Secunia

Trust: 0.4

sources: PACKETSTORM: 104917 // PACKETSTORM: 101909 // PACKETSTORM: 99104 // PACKETSTORM: 99217

SOURCES

db:CERT/CCid:VU#555316
db:VULHUBid:VHN-49375
db:BIDid:46767
db:JVNDBid:JVNDB-2011-004393
db:PACKETSTORMid:104917
db:PACKETSTORMid:101909
db:PACKETSTORMid:99104
db:PACKETSTORMid:99217
db:CNNVDid:CNNVD-201103-223
db:NVDid:CVE-2011-1430

LAST UPDATE DATE

2024-11-23T21:31:12.588000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#555316date:2011-09-08T00:00:00
db:VULHUBid:VHN-49375date:2017-08-17T00:00:00
db:BIDid:46767date:2015-04-13T21:35:00
db:JVNDBid:JVNDB-2011-004393date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201103-223date:2011-03-17T00:00:00
db:NVDid:CVE-2011-1430date:2024-11-21T01:26:17.720

SOURCES RELEASE DATE

db:CERT/CCid:VU#555316date:2011-03-07T00:00:00
db:VULHUBid:VHN-49375date:2011-03-16T00:00:00
db:BIDid:46767date:2011-03-07T00:00:00
db:JVNDBid:JVNDB-2011-004393date:2012-03-27T00:00:00
db:PACKETSTORMid:104917date:2011-09-08T08:14:47
db:PACKETSTORMid:101909date:2011-06-01T04:21:33
db:PACKETSTORMid:99104date:2011-03-09T06:30:49
db:PACKETSTORMid:99217date:2011-03-14T11:35:55
db:CNNVDid:CNNVD-201103-223date:2011-03-17T00:00:00
db:NVDid:CVE-2011-1430date:2011-03-16T22:55:04.747