CVE-2011-1506
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
22/03/2011
Last modified:
11/04/2025
Description
The STARTTLS implementation in Kerio Connect 7.1.4 build 2985 and MailServer 6.x does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. NOTE: some of these details are obtained from third party information.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:kerio:connect:7.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.6.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.6.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.6.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.7.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.7.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.7.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.7.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kerio:kerio_mailserver:5.7.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/43678
- http://www.kb.cert.org/vuls/id/555316
- http://www.kb.cert.org/vuls/id/MAPG-8D9M4P
- http://www.securityfocus.com/bid/46767
- http://www.vupen.com/english/advisories/2011/0610
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65932
- http://secunia.com/advisories/43678
- http://www.kb.cert.org/vuls/id/555316
- http://www.kb.cert.org/vuls/id/MAPG-8D9M4P
- http://www.securityfocus.com/bid/46767
- http://www.vupen.com/english/advisories/2011/0610
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65932



