FreeBSD : spamdyke -- STARTTLS Plaintext Injection Vulnerability (a47af810-3a17-11e1-a1be-00e0815b8da8)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia reports :

The vulnerability is caused due to the TLS implementation not properly
clearing transport layer buffers when upgrading from plaintext to
ciphertext after receiving the 'STARTTLS' command. This can be
exploited to insert arbitrary plaintext data (e.g. SMTP commands)
during the plaintext phase, which will then be executed after
upgrading to the TLS ciphertext phase.

See also :

http://www.spamdyke.org/documentation/Changelog.txt
http://www.nessus.org/u?62b92a3f

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 57455 ()

Bugtraq ID:

CVE ID: CVE-2012-0070

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now