Vulnerabilidad en STARTTLS de Postfix (CVE-2011-0411)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-264
Permisos, privilegios y/o control de acceso
Fecha de publicación:
16/03/2011
Última modificación:
11/04/2025
Descripción
La implementación de STARTTLS de Postfix 2.4.x anteriores a 2.4.16, 2.5.x anteriores a 2.5.12, 2.6.x anteriores a 2.6.9, y 2.7.x anteriores a 2.7.3 no restringe apropiadamente el buffering de I/O, lo que permite a atacantes man-in-the-middle insertar comandos en sesiones SMTP encriptadas enviando un comando en texto claro que es procesado después de que TLS es iniciado. Relacionado con un ataque de "inyección de comandos de texto en claro".
Impacto
Puntuación base 2.0
6.80
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:postfix:postfix:2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.13:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056559.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056560.html
- http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
- http://secunia.com/advisories/43646
- http://secunia.com/advisories/43874
- http://security.gentoo.org/glsa/glsa-201206-33.xml
- http://securitytracker.com/id?1025179=
- http://support.apple.com/kb/HT5002
- http://www.debian.org/security/2011/dsa-2233
- http://www.kb.cert.org/vuls/id/555316
- http://www.kb.cert.org/vuls/id/MORO-8ELH6Z
- http://www.openwall.com/lists/oss-security/2021/08/10/2
- http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
- http://www.osvdb.org/71021
- http://www.postfix.org/CVE-2011-0411.html
- http://www.redhat.com/support/errata/RHSA-2011-0422.html
- http://www.redhat.com/support/errata/RHSA-2011-0423.html
- http://www.securityfocus.com/bid/46767
- http://www.vupen.com/english/advisories/2011/0611
- http://www.vupen.com/english/advisories/2011/0752
- http://www.vupen.com/english/advisories/2011/0891
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65932
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056559.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056560.html
- http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
- http://secunia.com/advisories/43646
- http://secunia.com/advisories/43874
- http://security.gentoo.org/glsa/glsa-201206-33.xml
- http://securitytracker.com/id?1025179=
- http://support.apple.com/kb/HT5002
- http://www.debian.org/security/2011/dsa-2233
- http://www.kb.cert.org/vuls/id/555316
- http://www.kb.cert.org/vuls/id/MORO-8ELH6Z
- http://www.openwall.com/lists/oss-security/2021/08/10/2
- http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
- http://www.osvdb.org/71021
- http://www.postfix.org/CVE-2011-0411.html
- http://www.redhat.com/support/errata/RHSA-2011-0422.html
- http://www.redhat.com/support/errata/RHSA-2011-0423.html
- http://www.securityfocus.com/bid/46767
- http://www.vupen.com/english/advisories/2011/0611
- http://www.vupen.com/english/advisories/2011/0752
- http://www.vupen.com/english/advisories/2011/0891
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65932



