SMTP Service STARTTLS Plaintext Command Injection

This script is Copyright (C) 2011-2017 Tenable Network Security, Inc.

Synopsis :

The remote mail service allows plaintext command injection while
negotiating an encrypted communications channel.

Description :

The remote SMTP service contains a software flaw in its STARTTLS
implementation that could allow a remote, unauthenticated attacker to
inject commands during the plaintext protocol phase that will be
executed during the ciphertext protocol phase.

Successful exploitation could allow an attacker to steal a victim's
email or associated SASL (Simple Authentication and Security Layer)

See also :

Solution :

Contact the vendor to see if an update is available.

Risk factor :

Medium / CVSS Base Score : 4.0
CVSS Temporal Score : 3.5
Public Exploit Available : true

Family: SMTP problems

Nessus Plugin ID: 52611 ()

Bugtraq ID: 46767

CVE ID: CVE-2011-0411

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now