SMTP Service STARTTLS Plaintext Command Injection

This script is Copyright (C) 2011-2012 Tenable Network Security, Inc.


Synopsis :

The remote mail service allows plaintext command injection while
negotiating an encrypted communications channel.

Description :

The remote SMTP service contains a software flaw in its STARTTLS
implementation that could allow a remote, unauthenticated attacker to
inject commands during the plaintext protocol phase that will be
executed during the ciphertext protocol phase.

Successful exploitation could allow an attacker to steal a victim's
email or associated SASL (Simple Authentication and Security Layer)
credentials.

See also :

http://tools.ietf.org/html/rfc2487
http://www.securityfocus.com/archive/1/516901/30/0/threaded

Solution :

Contact the vendor to see if an update is available.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 3.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: SMTP problems

Nessus Plugin ID: 52611 ()

Bugtraq ID: 46767

CVE ID: CVE-2011-0411
CVE-2011-1430
CVE-2011-1431
CVE-2011-1432
CVE-2011-1506
CVE-2011-2165