CVE-2011-1430
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
16/03/2011
Last modified:
11/04/2025
Description
The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ipswitch:imail:*:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:imail:*:*:*:*:*:*:*:* | 11.03 (including) | |
| cpe:2.3:a:ipswitch:imail:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:imail:5.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:imail:5.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:imail:5.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:imail:5.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:imail:6.00:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:imail:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:imail:6.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:imail:6.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:imail:6.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:imail:6.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:imail:6.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:imail:6.0.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/43676
- http://www.kb.cert.org/vuls/id/555316
- http://www.kb.cert.org/vuls/id/MAPG-8DBRD4
- http://www.osvdb.org/71020
- http://www.securityfocus.com/bid/46767
- http://www.vupen.com/english/advisories/2011/0609
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65932
- http://secunia.com/advisories/43676
- http://www.kb.cert.org/vuls/id/555316
- http://www.kb.cert.org/vuls/id/MAPG-8DBRD4
- http://www.osvdb.org/71020
- http://www.securityfocus.com/bid/46767
- http://www.vupen.com/english/advisories/2011/0609
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65932



