Bug 674814 (CVE-2011-0411) - CVE-2011-0411 postfix: SMTP commands injection during plaintext to TLS session switch
Summary: CVE-2011-0411 postfix: SMTP commands injection during plaintext to TLS sessio...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-0411
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 682978 683168 683386 683387 683389 683392 833971
Blocks: 735401
TreeView+ depends on / blocked
 
Reported: 2011-02-03 13:03 UTC by Jan Lieskovsky
Modified: 2023-05-13 01:54 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-06-20 15:30:43 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:0422 0 normal SHIPPED_LIVE Moderate: postfix security update 2011-04-06 22:59:54 UTC
Red Hat Product Errata RHSA-2011:0423 0 normal SHIPPED_LIVE Moderate: postfix security update 2011-04-06 23:11:31 UTC

Description Jan Lieskovsky 2011-02-03 13:03:59 UTC
It was found, that Postfix, a Mail Transport Agent (MTA), recognized
SMTP commands during plaintex to TLS session switch (by TLS protocol
initialization). A remote attacker could use this flaw to insert
plaintext SMTP protocol commands into TLS protocol initialization
messages, leading to SMTP commands execution during the ciphertext
protocol phase, allowing the attacker to steal user credentials
and conduct man-in-the-middle (MITM) attacks.

References:
[1] http://www.kb.cert.org/vuls/id/555316 (not public yet)

Comment 2 Jan Lieskovsky 2011-02-03 13:09:49 UTC
This issue affects the versions of the postfix package, as shipped
with Red Hat Enterprise Linux 4, 5, and 6.

--

This issue affects the versions of the postfix package, as shipped
with Fedora release of 13 and 14.

Comment 14 Vincent Danen 2011-03-07 22:55:21 UTC
This is public now:

http://www.kb.cert.org/vuls/id/555316

It indicates that Postfix 2.7.3, 2.6.9, 2.5.12, and 2.4.16 have been released to correct the flaw.  Postfix 2.8 and 2.9 are not affected.

http://www.postfix.org/announcements/postfix-2.7.3.html

Comment 17 Jan Lieskovsky 2011-03-08 17:24:19 UTC
This issue did NOT affect the versions of the exim package,
as shipped with Red Hat Enterprise Linux 4 and 5.

--

This issue did NOT affect the versions of the exim package,
as present within EPEL-6 repository.

--

This issue did NOT affect the versions of the exim package,
as shipped with Fedora release of 13 and 14.

Comment 18 Jan Lieskovsky 2011-03-08 17:30:32 UTC
This issue did NOT affect the versions of the sendmail package,
as shipped with Red Hat Enterprise Linux 3, 4, 5, or 6.

--

This issue did NOT affect the versions of the sendmail package,
as shipped with Fedora release of 13 and 14.

Comment 19 Jan Lieskovsky 2011-03-08 18:04:53 UTC
Created postfix tracking bugs for this issue

Affects: fedora-all [bug 683168]

Comment 20 Vincent Danen 2011-03-08 21:10:53 UTC
This issue affects more than just MTAs.  See bug #683221 for a similar flaw in pure-ftpd.

Comment 25 Jan Lieskovsky 2011-03-10 17:55:19 UTC
Statement:

This issue affected postfix packages in Red Hat Enterprise Linux 4, 5, and 6.  It was corrected via RHSA-2011:0422 and RHSA-2011:0423.

This issue did not affect the versions of sendmail as shipped with Red Hat Enterprise Linux 3, 4, 5, or 6, and the versions of exim as shipped with Red Hat Enterprise Linux 4 and 5.

Comment 26 errata-xmlrpc 2011-04-06 23:00:01 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 4

Via RHSA-2011:0422 https://rhn.redhat.com/errata/RHSA-2011-0422.html

Comment 27 errata-xmlrpc 2011-04-06 23:11:39 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:0423 https://rhn.redhat.com/errata/RHSA-2011-0423.html

Comment 28 Vincent Danen 2011-04-06 23:28:41 UTC
Acknowledgements:

Red Hat would like to thank the CERT/CC for reporting CVE-2011-0411. The CERT/CC acknowledges Wietse Venema as the original reporter.


Note You need to log in before you can comment on or make changes to this bug.