CVE-2011-0411

NameCVE-2011-0411
DescriptionThe STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2233-1
NVD severitymedium (attack range: remote)
Debian Bugs617849

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
postfix (PTS)wheezy2.9.6-2fixed
jessie2.11.3-1+deb8u2fixed
stretch3.1.6-0+deb9u1fixed
buster, sid3.2.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
postfixsource(unstable)2.8.0-1medium617849
postfixsourcelenny2.5.5-1.1+lenny1mediumDSA-2233-1
postfixsourcesqueeze2.7.1-1+squeeze1mediumDSA-2233-1

Notes

http://www.securityfocus.com/archive/1/516901/30/0/threaded
http://www.postfix.org/announcements/postfix-2.7.3.html
http://www.postfix.org/CVE-2011-0411.html
http://www.kb.cert.org/vuls/id/MAPG-8D9M5Q

Search for package or bug name: Reporting problems