CVE Vulnerabilities

CVE-2011-0411

Published: Mar 16, 2011 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
4 MODERATE
AV:N/AC:H/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a plaintext command injection attack.

Affected Software

NameVendorStart VersionEnd Version
PostfixPostfix2.4 (including)2.4 (including)
PostfixPostfix2.4.0 (including)2.4.0 (including)
PostfixPostfix2.4.1 (including)2.4.1 (including)
PostfixPostfix2.4.2 (including)2.4.2 (including)
PostfixPostfix2.4.3 (including)2.4.3 (including)
PostfixPostfix2.4.4 (including)2.4.4 (including)
PostfixPostfix2.4.5 (including)2.4.5 (including)
PostfixPostfix2.4.6 (including)2.4.6 (including)
PostfixPostfix2.4.7 (including)2.4.7 (including)
PostfixPostfix2.4.8 (including)2.4.8 (including)
PostfixPostfix2.4.9 (including)2.4.9 (including)
PostfixPostfix2.4.10 (including)2.4.10 (including)
PostfixPostfix2.4.11 (including)2.4.11 (including)
PostfixPostfix2.4.12 (including)2.4.12 (including)
PostfixPostfix2.4.13 (including)2.4.13 (including)
PostfixPostfix2.4.14 (including)2.4.14 (including)
PostfixPostfix2.4.15 (including)2.4.15 (including)
Red Hat Enterprise Linux 4RedHatpostfix-2:2.2.10-1.4.el4*
Red Hat Enterprise Linux 5RedHatpostfix-2:2.3.3-2.2.el5_6*
Red Hat Enterprise Linux 6RedHatpostfix-2:2.6.6-2.1.el6_0*
PostfixUbuntudapper*
PostfixUbuntuhardy*
PostfixUbuntukarmic*
PostfixUbuntulucid*
PostfixUbuntumaverick*
PostfixUbuntuupstream*

References