Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Ipswitch IMail Server STARTTLS Plaintext Command Injection Vulnerability

Information

Severity

Severity

Medium

Family

Family

SMTP problems

CVSSv2 Base

CVSSv2 Base

6.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

13 years ago

Modified

Modified

5 years ago

Summary

The host is running Ipswitch IMail Server and is prone to plaintext command injection vulnerability.

Insight

Insight

This flaw is caused by an error within the 'STARTTLS' implementation where the switch from plaintext to TLS is implemented below the application's I/O buffering layer, which could allow attackers to inject commands during the plaintext phase of the protocol via man-in-the-middle attacks.

Affected Software

Affected Software

Ipswitch IMail versions 11.03 and Prior.

Solution

Solution

Upgrade to Ipswitch IMail version 11.5 or later.

Common Vulnerabilities and Exposures (CVE)