Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-0423

Опубликовано: 06 апр. 2011
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2011-0423: postfix security update (MODERATE)

[2:2.6.6-2.1]

  • fix CVE-2011-0411 (#682978)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

postfix

2.6.6-2.1.el6_0

postfix-perl-scripts

2.6.6-2.1.el6_0

Oracle Linux i686

postfix

2.6.6-2.1.el6_0

postfix-perl-scripts

2.6.6-2.1.el6_0

Связанные CVE

Связанные уязвимости

ubuntu
больше 14 лет назад

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.

redhat
больше 14 лет назад

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.

nvd
больше 14 лет назад

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.

debian
больше 14 лет назад

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x befo ...

github
около 3 лет назад

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.