Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-0423

Опубликовано: 06 апр. 2011
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2011-0423: postfix security update (MODERATE)

[2:2.6.6-2.1]

  • fix CVE-2011-0411 (#682978)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

postfix

2.6.6-2.1.el6_0

postfix-perl-scripts

2.6.6-2.1.el6_0

Oracle Linux i686

postfix

2.6.6-2.1.el6_0

postfix-perl-scripts

2.6.6-2.1.el6_0

Связанные CVE

Связанные уязвимости

ubuntu
около 15 лет назад

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.

redhat
около 15 лет назад

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.

nvd
около 15 лет назад

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.

debian
около 15 лет назад

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x befo ...

github
почти 4 года назад

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.