SB2011031703 - Input validation error in qmail netqmail
Published: March 17, 2011 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2011-1431)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The STARTTLS implementation in qmail-smtpd.c in qmail-smtpd in the netqmail-1.06-tls patch for netqmail 1.06 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. Per: http://cwe.mitre.org/data/definitions/77.html Improper Neutralization of Special Elements used in a Command ('Command Injection')
Remediation
Install update from vendor's website.
References
- http://inoa.net/qmail-tls/vu555316.patch
- http://securityreason.com/securityalert/8144
- http://www.kb.cert.org/vuls/id/555316
- http://www.kb.cert.org/vuls/id/MAPG-8D9M5Q
- http://www.postfix.org/CVE-2011-0411.html
- http://www.securityfocus.com/archive/1/516901
- http://www.securityfocus.com/bid/46767
- http://www.vupen.com/english/advisories/2011/0612
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65932