Vulnerability Details : CVE-2014-3556
The STARTTLS implementation in mail/ngx_mail_smtp_handler.c in the SMTP proxy in nginx 1.5.x and 1.6.x before 1.6.1 and 1.7.x before 1.7.4 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
Products affected by CVE-2014-3556
- cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3556
48.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3556
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2014-3556
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3556
-
http://nginx.org/download/patch.2014.starttls.txt
Patch;Vendor Advisory
-
http://mailman.nginx.org/pipermail/nginx-announce/2014/000144.html
[nginx-announce] nginx security advisory (CVE-2014-3556)Patch;Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1126891
1126891 – (CVE-2014-3556) CVE-2014-3556 nginx: SMTP STARTTLS plaintext injection flawIssue Tracking;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=142103967620673&w=2
'[security bulletin] HPSBOV03227 rev.1 - HP SSL for OpenVMS, Remote Disclosure of Information, Denial' - MARCIssue Tracking;Third Party Advisory
Jump to