Unrated severityNVD Advisory· Published Mar 16, 2011· Updated Apr 29, 2026
CVE-2011-1430
CVE-2011-1430
Description
The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
Affected products
46cpe:2.3:a:ipswitch:imail:*:*:*:*:*:*:*:*+ 45 more
- cpe:2.3:a:ipswitch:imail:*:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:10:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:10.01:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:10.02:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:11:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:11.01:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:11.02:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:2006:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:2006.1:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:2006.2:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:5.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:5.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:6.00:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:6.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:6.06:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:6.2:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:6.3:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:6.4:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:7.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:7.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:7.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:7.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:7.12:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:8.01:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:8.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:8.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:8.11:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:8.12:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:8.13:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:8.22:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail:server_8.2_hotfix_2:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- secunia.com/advisories/43676nvdVendor Advisory
- www.vupen.com/english/advisories/2011/0609nvdVendor Advisory
- www.kb.cert.org/vuls/id/555316nvdUS Government Resource
- www.kb.cert.org/vuls/id/MAPG-8DBRD4nvdUS Government Resource
- www.osvdb.org/71020nvd
- www.securityfocus.com/bid/46767nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/65932nvd
News mentions
0No linked articles in our index yet.