[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Command injection vulnerability in Ipswitch IMail 11.03 and earlier

ID: oval:org.secpod.oval:def:536Date: (C)2011-03-23   (M)2022-10-10
Class: VULNERABILITYFamily: windows




The host is installed with Ipswitch Imail server and is prone to command injection vulnerability. A flaw is present in the STARTTLS implementation, which fails to properly upgrade a connection from plaintext to TLS. Successful exploitation could allow remote attackers to inject SMTP commands during the plaintext phase and run them during the TLS phase via man-in-the-middle attacks.

Platform:
Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows XP
Product:
Ipswitch Imail
Reference:
CVE-2011-1430
CVE    1
CVE-2011-1430
CPE    46
cpe:/a:ipswitch:imail:8.0.5
cpe:/a:ipswitch:imail:8.0.3
cpe:/a:ipswitch:imail:6.00
cpe:/a:ipswitch:imail:7.0.1
...

© SecPod Technologies