Command injection vulnerability in Ipswitch IMail 11.03 and earlierID: oval:org.secpod.oval:def:536 | Date: (C)2011-03-23 (M)2022-10-10 |
Class: VULNERABILITY | Family: windows |
The host is installed with Ipswitch Imail server and is prone to command injection vulnerability. A flaw is present in the STARTTLS implementation, which fails to properly upgrade a connection from plaintext to TLS. Successful exploitation could allow remote attackers to inject SMTP commands during the plaintext phase and run them during the TLS phase via man-in-the-middle attacks.
Platform: |
Microsoft Windows 2000 |
Microsoft Windows 7 |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Microsoft Windows Vista |
Microsoft Windows XP |