{
  "threat_severity" : "Moderate",
  "public_date" : "2011-03-05T00:00:00Z",
  "bugzilla" : {
    "description" : "postfix: SMTP commands injection during plaintext to TLS session switch",
    "id" : "674814",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=674814"
  },
  "cvss" : {
    "cvss_base_score" : "4.0",
    "cvss_scoring_vector" : "AV:N/AC:H/Au:N/C:P/I:P/A:N",
    "status" : "verified"
  },
  "details" : [ "The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a \"plaintext command injection\" attack." ],
  "statement" : "This issue affected postfix packages in Red Hat Enterprise Linux 4, 5, and 6.  It was corrected via RHSA-2011:0422 and RHSA-2011:0423.\nThis issue did not affect the versions of sendmail as shipped with Red Hat Enterprise Linux 3, 4, 5, or 6, and the versions of exim as shipped with Red Hat Enterprise Linux 4 and 5.",
  "acknowledgement" : "Red Hat would like to thank CERT/CC for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2011-04-06T00:00:00Z",
    "advisory" : "RHSA-2011:0422",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "postfix-2:2.2.10-1.4.el4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2011-04-06T00:00:00Z",
    "advisory" : "RHSA-2011:0422",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "postfix-2:2.3.3-2.2.el5_6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2011-04-06T00:00:00Z",
    "advisory" : "RHSA-2011:0423",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "postfix-2:2.6.6-2.1.el6_0"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2011-0411\nhttps://nvd.nist.gov/vuln/detail/CVE-2011-0411" ],
  "name" : "CVE-2011-0411",
  "csaw" : false
}