ID

VAR-201103-0114


CVE

CVE-2011-0411


TITLE

STARTTLS plaintext command injection vulnerability

Trust: 0.8

sources: CERT/CC: VU#555316

DESCRIPTION

The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack. Some STARTTLS implementations could allow a remote attacker to inject commands during the plaintext phase of the protocol. plural STARTTLS There is a vulnerability in the implementation of. plural STARTTLS Implementation of a man-in-the-middle attack (man-in-the-middle attack) May insert a command. This vulnerability is due to the fact that switching to ciphertext communication is performed at a lower layer than the application. This vulnerability is only relevant for implementations that perform certificate validation.An arbitrary command may be executed by a remote attacker who can intercept communications. An attacker can exploit this issue to execute arbitrary commands in the context of the user running the application. Successful exploits can allow attackers to obtain email usernames and passwords. The following vendors are affected: Ipswitch Kerio Postfix Qmail-TLS Oracle (note that the affected application is unknown) SCO Group spamdyke ISC. Postfix is ​​a mail transfer agent used in Unix-like operating systems. The STARTTLS implementation in Postfix 2.4.x prior to 2.4.16, 2.5.x prior to 2.5.12, 2.6.x prior to 2.6.9, and 2.7.x prior to 2.7.3 did not properly restrict I/ O buffering effect. CVE-2011-4130 ProFTPD uses a response pool after freeing it under exceptional conditions, possibly leading to remote code execution. ---------------------------------------------------------------------- Get a tax break on purchases of Secunia Solutions! If you are a U.S. company, you may be qualified for a tax break for your software purchases. Learn more at: http://secunia.com/products/corporate/vim/section_179/ ---------------------------------------------------------------------- TITLE: Postfix "STARTTLS" Plaintext Injection Vulnerability SECUNIA ADVISORY ID: SA43646 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43646/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43646 RELEASE DATE: 2011-03-09 DISCUSS ADVISORY: http://secunia.com/advisories/43646/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/43646/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=43646 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Postfix, which can be exploited by malicious people to manipulate certain data. The vulnerability is caused due to the TLS implementation not properly clearing transport layer buffers when upgrading from plaintext to ciphertext after receiving the "STARTTLS" command. This can be exploited to insert arbitrary plaintext data (e.g. SMTP commands) during the plaintext phase, which will then be executed after upgrading to the TLS ciphertext phase. The vulnerability is reported in version 2.2 and all releases prior to versions 2.4.16, 2.5.12, 2.6.9, and 2.7.3. SOLUTION: Update to versions 2.4.16, 2.5.12, 2.6.9, and 2.7.3. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.postfix.org/CVE-2011-0411.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201206-33 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Postfix: Multiple vulnerabilities Date: June 25, 2012 Bugs: #358085, #366605 ID: 201206-33 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A vulnerability has been found in Postfix, the worst of which possibly allowing remote code execution. Background ========== Postfix is Wietse Venema=E2=80=99s mailer that attempts to be fast, easy = to administer, and secure, as an alternative to the widely-used Sendmail program. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 mail-mta/postfix < 2.7.4 >= 2.7.4 Description =========== A vulnerability have been discovered in Postfix. Please review the CVE identifier referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Postfix users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.7.4" References ========== [ 1 ] CVE-2011-0411 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0411 [ 2 ] CVE-2011-1720 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1720 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201206-33.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490 The updated packages have been patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0411 http://www.postfix.org/CVE-2011-0411.html http://www.kb.cert.org/vuls/id/555316 http://www.securityfocus.com/archive/1/516901/30/0/threaded _______________________________________________________________________ Updated Packages: Mandriva Linux 2009.0: eb607fe6834ded296aec54851a3bd56c 2009.0/i586/libpostfix1-2.5.5-4.2mdv2009.0.i586.rpm 76a18eb7f7627ba5489137eb592d0c8b 2009.0/i586/postfix-2.5.5-4.2mdv2009.0.i586.rpm 61c70b9d189f68276601d724e8444d9f 2009.0/i586/postfix-ldap-2.5.5-4.2mdv2009.0.i586.rpm 24255918008338487798ea647860484e 2009.0/i586/postfix-mysql-2.5.5-4.2mdv2009.0.i586.rpm e4d4db07cb302b3072f78097f84e1b87 2009.0/i586/postfix-pcre-2.5.5-4.2mdv2009.0.i586.rpm ebd9879c9c773c3d57375809c696f517 2009.0/i586/postfix-pgsql-2.5.5-4.2mdv2009.0.i586.rpm b27d3f6b20b11f71fd54d0f50a8a4b47 2009.0/SRPMS/postfix-2.5.5-4.2mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: 73053818f39aba0ee0bece7ab997b07c 2009.0/x86_64/lib64postfix1-2.5.5-4.2mdv2009.0.x86_64.rpm c0e3c04bfd70acc0ee09e7413b3a3400 2009.0/x86_64/postfix-2.5.5-4.2mdv2009.0.x86_64.rpm 435fe07232bf307882a1589bc1ccca22 2009.0/x86_64/postfix-ldap-2.5.5-4.2mdv2009.0.x86_64.rpm 4d1d018487d1c3328cd425d220136a6f 2009.0/x86_64/postfix-mysql-2.5.5-4.2mdv2009.0.x86_64.rpm e7bd9b102319bc1ed4cdda27edaf26e2 2009.0/x86_64/postfix-pcre-2.5.5-4.2mdv2009.0.x86_64.rpm 7051b04bff45730a0268c5b311361111 2009.0/x86_64/postfix-pgsql-2.5.5-4.2mdv2009.0.x86_64.rpm b27d3f6b20b11f71fd54d0f50a8a4b47 2009.0/SRPMS/postfix-2.5.5-4.2mdv2009.0.src.rpm Mandriva Linux 2010.0: f83a569908244de2e04f13c5e9cbc29a 2010.0/i586/libpostfix1-2.6.5-2.1mdv2010.0.i586.rpm b28f60198223458fe7a8b9c92d9901c1 2010.0/i586/postfix-2.6.5-2.1mdv2010.0.i586.rpm 1572c433ec62d49970a250050da98ed7 2010.0/i586/postfix-ldap-2.6.5-2.1mdv2010.0.i586.rpm 2aeb9f3d82b97e4314b3f8d6500a244a 2010.0/i586/postfix-mysql-2.6.5-2.1mdv2010.0.i586.rpm 2d93c886dda73832ee8b96961e0cc316 2010.0/i586/postfix-pcre-2.6.5-2.1mdv2010.0.i586.rpm 544853ecd21ca236324418232b59d206 2010.0/i586/postfix-pgsql-2.6.5-2.1mdv2010.0.i586.rpm e3748479ec6c93be12808e26e6b0fa55 2010.0/SRPMS/postfix-2.6.5-2.1mdv2010.0.src.rpm Mandriva Linux 2010.0/X86_64: 0282b58fb34ab310a8e66cda1792da37 2010.0/x86_64/lib64postfix1-2.6.5-2.1mdv2010.0.x86_64.rpm 644f3b20cfed1b5e57ef53a7ef94898a 2010.0/x86_64/postfix-2.6.5-2.1mdv2010.0.x86_64.rpm 16b27a49a3dcae6fa520c3cb24b2f69b 2010.0/x86_64/postfix-ldap-2.6.5-2.1mdv2010.0.x86_64.rpm 9e60217b6e8adc9a0e286df835f9d695 2010.0/x86_64/postfix-mysql-2.6.5-2.1mdv2010.0.x86_64.rpm 8594b10f400395fff17ffda26e9e3b3d 2010.0/x86_64/postfix-pcre-2.6.5-2.1mdv2010.0.x86_64.rpm e63fb8c5794ce971488898af1d537f36 2010.0/x86_64/postfix-pgsql-2.6.5-2.1mdv2010.0.x86_64.rpm e3748479ec6c93be12808e26e6b0fa55 2010.0/SRPMS/postfix-2.6.5-2.1mdv2010.0.src.rpm Mandriva Linux 2010.1: 19ee5b6c6a18c73ccf1d74e20f89759d 2010.1/i586/libpostfix1-2.7.0-4.1mdv2010.2.i586.rpm 7a468df2b451f6972c38faf1f60ad8af 2010.1/i586/postfix-2.7.0-4.1mdv2010.2.i586.rpm a814f84c61afd93f3416c69d993afd7a 2010.1/i586/postfix-cdb-2.7.0-4.1mdv2010.2.i586.rpm f6f7f9492ab304d28f8aa4bfc653ca1e 2010.1/i586/postfix-ldap-2.7.0-4.1mdv2010.2.i586.rpm 8013bafd20881dd85b3be95529be848d 2010.1/i586/postfix-mysql-2.7.0-4.1mdv2010.2.i586.rpm 145c8551dc1c51b071d1f3f992f8e638 2010.1/i586/postfix-pcre-2.7.0-4.1mdv2010.2.i586.rpm 8f0d058eda66267085cbe5a7f5133b60 2010.1/i586/postfix-pgsql-2.7.0-4.1mdv2010.2.i586.rpm c90d8220b74b39ce44a4b9dfe8876783 2010.1/SRPMS/postfix-2.7.0-4.1mdv2010.2.src.rpm Mandriva Linux 2010.1/X86_64: 0a9207a9e00cce2e656ff248513d5bc3 2010.1/x86_64/lib64postfix1-2.7.0-4.1mdv2010.2.x86_64.rpm 3e2cc9ea2bf3d6979d5c6a5b3ec9b54a 2010.1/x86_64/postfix-2.7.0-4.1mdv2010.2.x86_64.rpm c8c5efad63b597b3d3a0aec3c5027ffa 2010.1/x86_64/postfix-cdb-2.7.0-4.1mdv2010.2.x86_64.rpm 71d9a4095514c72494c4f02d2696b619 2010.1/x86_64/postfix-ldap-2.7.0-4.1mdv2010.2.x86_64.rpm 8865fea8796435b2d715bf0d89c4530f 2010.1/x86_64/postfix-mysql-2.7.0-4.1mdv2010.2.x86_64.rpm 784960a49889f3fce8a308842321d8e8 2010.1/x86_64/postfix-pcre-2.7.0-4.1mdv2010.2.x86_64.rpm dc50ccda7bfb1a1f7f673bc251f14683 2010.1/x86_64/postfix-pgsql-2.7.0-4.1mdv2010.2.x86_64.rpm c90d8220b74b39ce44a4b9dfe8876783 2010.1/SRPMS/postfix-2.7.0-4.1mdv2010.2.src.rpm Corporate 4.0: 6b7d62433679d20ae3b5cdf2668019e7 corporate/4.0/i586/libpostfix1-2.3.5-0.4.20060mlcs4.i586.rpm c5d4cbc67d00e0ea8b32c6598d6d65f0 corporate/4.0/i586/postfix-2.3.5-0.4.20060mlcs4.i586.rpm 287daadea040f15c1e25a6de77a438b2 corporate/4.0/i586/postfix-ldap-2.3.5-0.4.20060mlcs4.i586.rpm aac87a567ae68c48d4e8226429b35697 corporate/4.0/i586/postfix-mysql-2.3.5-0.4.20060mlcs4.i586.rpm c331a8061b0c5a6639c633d608e37871 corporate/4.0/i586/postfix-pcre-2.3.5-0.4.20060mlcs4.i586.rpm 25ce650233120a54e830c120f773f715 corporate/4.0/i586/postfix-pgsql-2.3.5-0.4.20060mlcs4.i586.rpm f2f060fddbb666572eca06ae47e36a3a corporate/4.0/SRPMS/postfix-2.3.5-0.4.20060mlcs4.src.rpm Corporate 4.0/X86_64: 45b683c80b3006c3df5144bfe0fede86 corporate/4.0/x86_64/lib64postfix1-2.3.5-0.4.20060mlcs4.x86_64.rpm fc82cfcdbf89c059b6850edfa049128f corporate/4.0/x86_64/postfix-2.3.5-0.4.20060mlcs4.x86_64.rpm 7057754d88c8146d235d3ab96fd64d2f corporate/4.0/x86_64/postfix-ldap-2.3.5-0.4.20060mlcs4.x86_64.rpm 872c28155eb6276ba0fd1001387ffac7 corporate/4.0/x86_64/postfix-mysql-2.3.5-0.4.20060mlcs4.x86_64.rpm 644747748d18077fc63aa740c2947768 corporate/4.0/x86_64/postfix-pcre-2.3.5-0.4.20060mlcs4.x86_64.rpm 19b2a209beade7e6e25de6d0f3cb4b6d corporate/4.0/x86_64/postfix-pgsql-2.3.5-0.4.20060mlcs4.x86_64.rpm f2f060fddbb666572eca06ae47e36a3a corporate/4.0/SRPMS/postfix-2.3.5-0.4.20060mlcs4.src.rpm Mandriva Enterprise Server 5: 9c50578bd954be2ea42e6f3f3131cc9c mes5/i586/libpostfix1-2.5.5-4.2mdvmes5.2.i586.rpm bca22f9be6e6bef4e02f2ffb4623d2e3 mes5/i586/postfix-2.5.5-4.2mdvmes5.2.i586.rpm 45cfa7336d29cddca1ac07270d2b8287 mes5/i586/postfix-ldap-2.5.5-4.2mdvmes5.2.i586.rpm 87d4b942fefedc239a213b3ce5715cf0 mes5/i586/postfix-mysql-2.5.5-4.2mdvmes5.2.i586.rpm b3caf9572b69e757b9697139bb0ed5d8 mes5/i586/postfix-pcre-2.5.5-4.2mdvmes5.2.i586.rpm bde845f9957e2ead0e398c5bebef6f79 mes5/i586/postfix-pgsql-2.5.5-4.2mdvmes5.2.i586.rpm 8ad3739bcdf5297b2dddfb4e289049d9 mes5/SRPMS/postfix-2.5.5-4.2mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: d920df80c9fdbcb64a9c50d265acd7e8 mes5/x86_64/lib64postfix1-2.5.5-4.2mdvmes5.2.x86_64.rpm 1d09a25b69b76b2c013bac182c0e456d mes5/x86_64/postfix-2.5.5-4.2mdvmes5.2.x86_64.rpm 0afe348155bee4af965ec616d86a9219 mes5/x86_64/postfix-ldap-2.5.5-4.2mdvmes5.2.x86_64.rpm db4e476a96f489d957610fb1ff7c6f9e mes5/x86_64/postfix-mysql-2.5.5-4.2mdvmes5.2.x86_64.rpm 6ce0428271de05b3bb2d2e430c3281a3 mes5/x86_64/postfix-pcre-2.5.5-4.2mdvmes5.2.x86_64.rpm 32468daeee58b727ce1c85adcc2b364c mes5/x86_64/postfix-pgsql-2.5.5-4.2mdvmes5.2.x86_64.rpm 8ad3739bcdf5297b2dddfb4e289049d9 mes5/SRPMS/postfix-2.5.5-4.2mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-2939 The postinst script grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files. CVE-2011-1720 A heap-based read-only buffer overflow allows malicious clients to crash the smtpd server process using a crafted SASL authentication request. For the oldstable distribution (lenny), this problem has been fixed in version 2.5.5-1.1+lenny1. For the stable distribution (squeeze), this problem has been fixed in version 2.7.1-1+squeeze1. For the unstable distribution (sid), this problem has been fixed in version 2.8.0-1. We recommend that you upgrade your postfix packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iQEcBAEBAgAGBQJNyXybAAoJEL97/wQC1SS+xb0H/igqYhOTtvO91deptOPyednw 5sBQPXGoo+RXeomLsJk8P6ezm7fEGTSl7GUEpNwS1qsqAPVnl9XAK6dOGFae1PbG 2L93eR6AKgKo60tp2On1Tf1c0HcD6yKiZ6J7C7nZ3E8+yZwSd1k6826ZUQ3gzKKW DTIu6w2CzzleK/bppWfhAvwvobHD6X1B16qklZfqw6H0C/QfMjM8ZXLCRv9Tq1TN jX1W4qeed7pr8r3pTJ9npzae7drqFLoVDi0tpGKi0UHEwgRma1AbDaI2BVmeblue YNRHg7H+TqfrUwN8iB64WrYvqnHCQfvViL8f0ML2uJXJf/lHby+vxPl6EGxAIoY= =yCCp -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 3.33

sources: NVD: CVE-2011-0411 // CERT/CC: VU#555316 // JVNDB: JVNDB-2011-001357 // BID: 46767 // VULHUB: VHN-48356 // VULMON: CVE-2011-0411 // PACKETSTORM: 107027 // PACKETSTORM: 99457 // PACKETSTORM: 99097 // PACKETSTORM: 114177 // PACKETSTORM: 99392 // PACKETSTORM: 101275

AFFECTED PRODUCTS

vendor:postfixmodel:postfixscope:eqversion:2.4.3

Trust: 1.6

vendor:postfixmodel:postfixscope:eqversion:2.4.8

Trust: 1.6

vendor:postfixmodel:postfixscope:eqversion:2.4.1

Trust: 1.6

vendor:postfixmodel:postfixscope:eqversion:2.4.7

Trust: 1.6

vendor:postfixmodel:postfixscope:eqversion:2.4.5

Trust: 1.6

vendor:postfixmodel:postfixscope:eqversion:2.4.6

Trust: 1.6

vendor:postfixmodel:postfixscope:eqversion:2.4.4

Trust: 1.6

vendor:postfixmodel:postfixscope:eqversion:2.4.2

Trust: 1.6

vendor:postfixmodel:postfixscope:eqversion:2.4.0

Trust: 1.6

vendor:postfixmodel:postfixscope:eqversion:2.4

Trust: 1.6

vendor:postfixmodel:postfixscope:eqversion:2.4.9

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.5.11

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.6.0

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.6.1

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.4.15

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.4.13

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.5.1

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.7.1

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.5.6

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.4.12

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.6.4

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.5.5

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.6.5

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.5.4

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.6.7

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.4.11

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.4.14

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.6.8

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.7.0

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.5.9

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.7.2

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.5.0

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.5.3

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.4.10

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.6.6

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.6

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.6.2

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.5.10

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.5.8

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.6.3

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.5.2

Trust: 1.0

vendor:postfixmodel:postfixscope:eqversion:2.5.7

Trust: 1.0

vendor:cyrus imapmodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:ipswitchmodel: - scope: - version: -

Trust: 0.8

vendor:keriomodel: - scope: - version: -

Trust: 0.8

vendor:postfixmodel: - scope: - version: -

Trust: 0.8

vendor:qmail tlsmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:watchguardmodel: - scope: - version: -

Trust: 0.8

vendor:proftpdmodel:proftpdscope:eqversion:1.3.3

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0 (x86-64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0 (x64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux clientscope:eqversion:2008 and 12.5

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11 (x64)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux long lifescope:eqversion:(v. 5.6 server)

Trust: 0.8

vendor:red hatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.8

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.3.1

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:6.1

Trust: 0.3

vendor:spamdykemodel:spamdykescope:neversion:4.2.1

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.7.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.7

Trust: 0.3

vendor:cyrusmodel:imap serverscope:eqversion:2.4

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.5.4

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.22

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:susemodel:linux enterprise sp3scope:eqversion:10

Trust: 0.3

vendor:kolabmodel:groupware server 2.2-rc3scope: - version: -

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.9

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.6

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.01

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.4.9

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:7.0.5

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.3

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.5.5

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.1.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.8

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:7.0.1

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.3.2

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.2.3

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:pureftpdmodel:pure-ftpdscope:neversion:1.0.30

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.3

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:10.04

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.5

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:20011115

Trust: 0.3

vendor:kolabmodel:groupware server -rc2scope:eqversion:2.2

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2.3

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.11

Trust: 0.3

vendor:sunmodel:java system messaging serverscope:eqversion:7.0

Trust: 0.3

vendor:keriomodel:mailserver patchscope:eqversion:6.7.01

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.2.2

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:5.0.8

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.5

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.1

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20110

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.5.2

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.6.3

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.3

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.1.3

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:4.0

Trust: 0.3

vendor:ipswitchmodel:imail hotfixscope:eqversion:8.22

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:5.0.5

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.13

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:keriomodel:mailserver patchscope:eqversion:6.6.23

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.2

Trust: 0.3

vendor:susemodel:linux enterprise sp2scope:eqversion:10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:pureftpdmodel:pure-ftpdscope:eqversion:1.0.29

Trust: 0.3

vendor:kolabmodel:groupware server 2.1.beta3scope: - version: -

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.0

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.3.3

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.4.1

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:7.0.2

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.3

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:kolabmodel:groupware serverscope:neversion:2.3.2

Trust: 0.3

vendor:iscmodel:innscope:neversion:2.5.3

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.8

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.10

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:7.0.3

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.4.8

Trust: 0.3

vendor:spamdykemodel:spamdykescope:eqversion:4.2

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:keriomodel:mailserver patchscope:eqversion:6.1.31

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:9.10

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.1

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.1

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.2

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.4

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.1

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:1.1.13

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:19991231

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:4.0

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:4.0

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:6.4

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.1

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.0.3

Trust: 0.3

vendor:cyrusmodel:imap serverscope:neversion:2.4.7

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.10

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.7

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.6.1

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.3.1

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.10

Trust: 0.3

vendor:keriomodel:connect buildscope:eqversion:7.1.42985

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:7.12

Trust: 0.3

vendor:susemodel:linux enterprise sp4scope:eqversion:10

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.6.2

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.4.2

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.1

Trust: 0.3

vendor:kolabmodel:groupware server 2.1beta2scope: - version: -

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.0.5

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.10

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.6-20080902

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:5.0.6

Trust: 0.3

vendor:susemodel:linux enterprise sp1scope:eqversion:11

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:4.0

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.2

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.6

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:scomodel:scooffice serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.9

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.20

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.1

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:7.0.4

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.7

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.3.1

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.3

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.1

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:4.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.10

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.2

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:3.1

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.1

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2.2

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.1.3

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:1.1.12

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.10

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.2.4

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:1.1.11

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0.1

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.4

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:watchguardmodel:xcsscope:eqversion:9.1

Trust: 0.3

vendor:qmail smtpd authmodel:netqmailscope:eqversion:0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.4.0

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.14

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.10

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.4.1

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:7.0.7

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.6

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:1.0.21

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.0

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.1

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2.4

Trust: 0.3

vendor:sunmodel:java system messaging serverscope:eqversion:6.3

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:4.0

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.5

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:kolabmodel:groupware server 2.2-rc1scope: - version: -

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.10

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.6.5

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:message networking sp1scope:eqversion:5.2

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.8

Trust: 0.3

vendor:kolabmodel:groupware server beta3scope:eqversion:2.2

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:iscmodel:innscope:eqversion:2.3

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:4.0

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:6.3

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.10

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.6

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:20010228

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.6.4

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.2

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.1.1

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:4.0

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:0

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:7.1

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:4.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.2

Trust: 0.3

vendor:ipswitchmodel:imail hotfixscope:eqversion:8.151

Trust: 0.3

vendor:cyrusmodel:imap serverscope:eqversion:2.4.6

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:6.0.2

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:2006.2

Trust: 0.3

vendor:ietfmodel:starttlsscope:eqversion:0

Trust: 0.3

vendor:keriomodel:mailserver buildscope:eqversion:6.6.17069

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:7.0

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:5.0.7

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20090

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.1

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:messaging storage server sp3scope:eqversion:5.2

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:kolabmodel:groupware server beta1scope:eqversion:2.2

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.5

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:6.2

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:wietsemodel:venema postfix patchlevelscope:eqversion:2.5.44

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.2

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:7.0.6

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.1

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.4

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.7

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.4

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:2.2.10

Trust: 0.3

vendor:wietsemodel:venema postfixscope:eqversion:19990906

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:9.10

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.1

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:4.0

Trust: 0.3

vendor:keriomodel:mailserverscope:eqversion:5.7.6

Trust: 0.3

vendor:watchguardmodel:xcsscope:eqversion:9.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

sources: CERT/CC: VU#555316 // BID: 46767 // JVNDB: JVNDB-2011-001357 // CNNVD: CNNVD-201103-213 // NVD: CVE-2011-0411

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0411
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#555316
value: 1.39

Trust: 0.8

NVD: CVE-2011-0411
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201103-213
value: MEDIUM

Trust: 0.6

VULHUB: VHN-48356
value: MEDIUM

Trust: 0.1

VULMON: CVE-2011-0411
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-0411
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-48356
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#555316 // VULHUB: VHN-48356 // VULMON: CVE-2011-0411 // JVNDB: JVNDB-2011-001357 // CNNVD: CNNVD-201103-213 // NVD: CVE-2011-0411

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-48356 // JVNDB: JVNDB-2011-001357 // NVD: CVE-2011-0411

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 107027 // PACKETSTORM: 114177 // CNNVD: CNNVD-201103-213

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201103-213

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-001357

PATCH

title:postfix-2.3.3-2.10.AXS3url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=1399

Trust: 0.8

title:2211url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=2211

Trust: 0.8

title:2212url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=2212

Trust: 0.8

title:3624url:http://bugs.proftpd.org/show_bug.cgi?id=3624

Trust: 0.8

title:NEWS-1.3.3eurl:http://www.proftpd.org/docs/NEWS-1.3.3e

Trust: 0.8

title:NEWS-1.3.4rc2url:http://www.proftpd.org/docs/NEWS-1.3.4rc2

Trust: 0.8

title:RHSA-2011:0422url:https://rhn.redhat.com/errata/RHSA-2011-0422.html

Trust: 0.8

title:RHSA-2011:0423url:https://rhn.redhat.com/errata/RHSA-2011-0423.html

Trust: 0.8

title:TLSA-2011-13url:http://www.turbolinux.co.jp/security/2011/TLSA-2011-13j.txt

Trust: 0.8

title:TLSA-2013-4url:http://www.turbolinux.co.jp/security/2013/TLSA-2013-4j.html

Trust: 0.8

title:Postfix STARTTLS Achieve repair measures for plaintext command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159437

Trust: 0.6

title:Debian CVElist Bug Report Logs: postfix STARTTLS affected by CVE-2011-0411url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=74282b8fe400ed6ddbb6171a1052e2fd

Trust: 0.1

title:Debian CVElist Bug Report Logs: [CVE-2011-4130] Use-after-free issueurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=f7453f9ff437afb706c192fb10d67eb2

Trust: 0.1

title:Debian CVElist Bug Report Logs: inn: CVE-2012-3523 prone to STARTTLS plaintext command injectionurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=a774850c70017348487727b907fda84b

Trust: 0.1

title:Debian CVElist Bug Report Logs: courier: CVE-2021-38084url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=9dc8ffd76b724b58108eb46bc913121c

Trust: 0.1

title:Debian CVElist Bug Report Logs: STARTTLS plaintext command injectionurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=b03b4eab65949f1c915b1538f80e6a4b

Trust: 0.1

title:Ubuntu Security Notice: postfix vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1113-1

Trust: 0.1

title:Debian Security Advisories: DSA-2346-2 proftpd-dfsg -- several vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=a1db5959643fcc6f1957a67359aa92ed

Trust: 0.1

title:Debian Security Advisories: DSA-2233-1 postfix -- several vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=96aadd3bb66ec0adb18615b395c09544

Trust: 0.1

title:Visionurl:https://github.com/CoolerVoid/Vision

Trust: 0.1

title:Vision2url:https://github.com/CoolerVoid/Vision2

Trust: 0.1

sources: VULMON: CVE-2011-0411 // JVNDB: JVNDB-2011-001357 // CNNVD: CNNVD-201103-213

EXTERNAL IDS

db:CERT/CCid:VU#555316

Trust: 3.8

db:NVDid:CVE-2011-0411

Trust: 3.5

db:BIDid:46767

Trust: 2.9

db:SECUNIAid:43646

Trust: 2.8

db:VUPENid:ADV-2011-0611

Trust: 2.6

db:SECTRACKid:1025179

Trust: 2.6

db:SECUNIAid:43874

Trust: 1.8

db:VUPENid:ADV-2011-0891

Trust: 1.8

db:VUPENid:ADV-2011-0752

Trust: 1.8

db:OSVDBid:71021

Trust: 1.8

db:JUNIPERid:JSA10705

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2021/08/10/2

Trust: 1.1

db:XFid:65932

Trust: 0.8

db:JVNDBid:JVNDB-2011-001357

Trust: 0.8

db:CNNVDid:CNNVD-201103-213

Trust: 0.7

db:PACKETSTORMid:99457

Trust: 0.2

db:PACKETSTORMid:114177

Trust: 0.2

db:PACKETSTORMid:99392

Trust: 0.2

db:PACKETSTORMid:107027

Trust: 0.2

db:PACKETSTORMid:99053

Trust: 0.1

db:VULHUBid:VHN-48356

Trust: 0.1

db:VULMONid:CVE-2011-0411

Trust: 0.1

db:PACKETSTORMid:99097

Trust: 0.1

db:PACKETSTORMid:101275

Trust: 0.1

sources: CERT/CC: VU#555316 // VULHUB: VHN-48356 // VULMON: CVE-2011-0411 // BID: 46767 // PACKETSTORM: 107027 // PACKETSTORM: 99457 // PACKETSTORM: 99097 // PACKETSTORM: 114177 // PACKETSTORM: 99392 // PACKETSTORM: 101275 // JVNDB: JVNDB-2011-001357 // CNNVD: CNNVD-201103-213 // NVD: CVE-2011-0411

REFERENCES

url:http://www.kb.cert.org/vuls/id/555316

Trust: 3.1

url:http://www.securityfocus.com/bid/46767

Trust: 2.6

url:http://securitytracker.com/id?1025179

Trust: 2.6

url:http://secunia.com/advisories/43646

Trust: 2.6

url:http://www.vupen.com/english/advisories/2011/0611

Trust: 2.6

url:http://www.postfix.org/cve-2011-0411.html

Trust: 2.4

url:http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html

Trust: 2.1

url:http://security.gentoo.org/glsa/glsa-201206-33.xml

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2011//oct/msg00003.html

Trust: 1.8

url:http://support.apple.com/kb/ht5002

Trust: 1.8

url:http://www.kb.cert.org/vuls/id/moro-8elh6z

Trust: 1.8

url:http://www.debian.org/security/2011/dsa-2233

Trust: 1.8

url:http://lists.fedoraproject.org/pipermail/package-announce/2011-march/056560.html

Trust: 1.8

url:http://lists.fedoraproject.org/pipermail/package-announce/2011-march/056559.html

Trust: 1.8

url:http://www.osvdb.org/71021

Trust: 1.8

url:http://www.redhat.com/support/errata/rhsa-2011-0422.html

Trust: 1.8

url:http://www.redhat.com/support/errata/rhsa-2011-0423.html

Trust: 1.8

url:http://secunia.com/advisories/43874

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html

Trust: 1.8

url:http://www.vupen.com/english/advisories/2011/0752

Trust: 1.8

url:http://www.vupen.com/english/advisories/2011/0891

Trust: 1.8

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/65932

Trust: 1.8

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10705

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/08/10/2

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0411

Trust: 0.9

url:http://tools.ietf.org/html/rfc2595

Trust: 0.8

url:http://tools.ietf.org/html/rfc3207

Trust: 0.8

url:http://tools.ietf.org/html/rfc4642

Trust: 0.8

url:https://bugzilla.redhat.com/show_bug.cgi?id=674814

Trust: 0.8

url:http://www.watchguard.com/archive/softwarecenter.asp

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/65932

Trust: 0.8

url:http://jvn.jp/cert/jvnvu555316

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0411

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2011-0411

Trust: 0.5

url:http://kolab.org/pipermail/kolab-announce/2011/000101.html

Trust: 0.3

url:http://bugzilla.cyrusimap.org/show_bug.cgi?id=3424

Trust: 0.3

url:http://cyrusimap.org/mediawiki/index.php/bugs_resolved_in_2.4.7

Trust: 0.3

url:https://www.isc.org/software/inn/2.5.3article

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/mapg-8d9m4p

Trust: 0.3

url:http://files.kolab.org/server/release/kolab-server-2.3.2/sources/release-notes.txt

Trust: 0.3

url:http://www.pureftpd.org/project/pure-ftpd/news

Trust: 0.3

url:http://www.watchguard.com/support/release-notes/xcs/9/en-us/en_releasenotes_xcs_9_1_1/en_releasenotes_wg_xcs_9_1_tls_hotfix.pdf

Trust: 0.3

url:http://www.spamdyke.org/documentation/changelog.txt

Trust: 0.3

url:http://datatracker.ietf.org/doc/draft-josefsson-kerberos5-starttls/?include_text=1

Trust: 0.3

url:/archive/1/516901

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100134676

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100141041

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=850478

Trust: 0.3

url:http://inoa.net/qmail-tls/vu555316.patch

Trust: 0.3

url:http://secunia.com/

Trust: 0.2

url:http://www.debian.org/security/faq

Trust: 0.2

url:http://www.debian.org/security/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:http://www.mandriva.com/security/

Trust: 0.2

url:http://store.mandriva.com/product_info.php?cpath=149&amp;products_id=490

Trust: 0.2

url:http://www.mandriva.com/security/advisories

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-1720

Trust: 0.2

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10705

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617849

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=22617

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/1113-1/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4130

Trust: 0.1

url:http://secunia.com/advisories/43646/#comments

Trust: 0.1

url:http://secunia.com/products/corporate/vim/section_179/

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/43646/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43646

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1720

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0411

Trust: 0.1

url:http://www.securityfocus.com/archive/1/516901/30/0/threaded

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2939

Trust: 0.1

sources: CERT/CC: VU#555316 // VULHUB: VHN-48356 // VULMON: CVE-2011-0411 // BID: 46767 // PACKETSTORM: 107027 // PACKETSTORM: 99457 // PACKETSTORM: 99097 // PACKETSTORM: 114177 // PACKETSTORM: 99392 // PACKETSTORM: 101275 // JVNDB: JVNDB-2011-001357 // CNNVD: CNNVD-201103-213 // NVD: CVE-2011-0411

CREDITS

Wietse Venema

Trust: 0.3

sources: BID: 46767

SOURCES

db:CERT/CCid:VU#555316
db:VULHUBid:VHN-48356
db:VULMONid:CVE-2011-0411
db:BIDid:46767
db:PACKETSTORMid:107027
db:PACKETSTORMid:99457
db:PACKETSTORMid:99097
db:PACKETSTORMid:114177
db:PACKETSTORMid:99392
db:PACKETSTORMid:101275
db:JVNDBid:JVNDB-2011-001357
db:CNNVDid:CNNVD-201103-213
db:NVDid:CVE-2011-0411

LAST UPDATE DATE

2025-06-24T20:22:56.098000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#555316date:2011-09-08T00:00:00
db:VULHUBid:VHN-48356date:2017-08-17T00:00:00
db:VULMONid:CVE-2011-0411date:2021-08-10T00:00:00
db:BIDid:46767date:2015-04-13T21:35:00
db:JVNDBid:JVNDB-2011-001357date:2013-08-09T00:00:00
db:CNNVDid:CNNVD-201103-213date:2021-08-11T00:00:00
db:NVDid:CVE-2011-0411date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#555316date:2011-03-07T00:00:00
db:VULHUBid:VHN-48356date:2011-03-16T00:00:00
db:VULMONid:CVE-2011-0411date:2011-03-16T00:00:00
db:BIDid:46767date:2011-03-07T00:00:00
db:PACKETSTORMid:107027date:2011-11-16T04:40:08
db:PACKETSTORMid:99457date:2011-03-18T21:45:06
db:PACKETSTORMid:99097date:2011-03-09T06:30:30
db:PACKETSTORMid:114177date:2012-06-25T22:58:41
db:PACKETSTORMid:99392date:2011-03-16T21:26:42
db:PACKETSTORMid:101275date:2011-05-10T18:42:48
db:JVNDBid:JVNDB-2011-001357date:2011-04-05T00:00:00
db:CNNVDid:CNNVD-201103-213date:2011-03-17T00:00:00
db:NVDid:CVE-2011-0411date:2011-03-16T22:55:02.717