Lucene search

K
cve[email protected]CVE-2014-3556
HistoryDec 29, 2014 - 8:59 p.m.

CVE-2014-3556

2014-12-2920:59:03
CWE-77
web.nvd.nist.gov
67
cve-2014-3556
starttls
mail proxy
smtp
nginx 1.5.x
nginx 1.6.x
nginx 1.7.x
plaintext command injection

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.8 Medium

AI Score

Confidence

Low

0.011 Low

EPSS

Percentile

84.8%

The STARTTLS implementation in mail/ngx_mail_smtp_handler.c in the SMTP proxy in nginx 1.5.x and 1.6.x before 1.6.1 and 1.7.x before 1.7.4 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a “plaintext command injection” attack, a similar issue to CVE-2011-0411.

Affected configurations

NVD
Node
f5nginxRange1.5.61.6.1
OR
f5nginxRange1.7.01.7.4

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.8 Medium

AI Score

Confidence

Low

0.011 Low

EPSS

Percentile

84.8%