First published: Tue Aug 17 2021(Updated: )
In s/qmail through 4.0.07, an active MitM can inject arbitrary plaintext commands into a STARTTLS encrypted session between an SMTP client and s/qmail. This allows e-mail messages and user credentials to be sent to the MitM attacker.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Qmail | <=4.0.07 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15955 is considered a critical vulnerability due to the potential for Man-in-the-Middle attacks resulting in the exposure of sensitive information.
To mitigate CVE-2020-15955, upgrade s/qmail to a version later than 4.0.07 that addresses this vulnerability.
CVE-2020-15955 allows attackers to intercept and manipulate email communications, potentially leading to data breaches.
If you are using s/qmail version 4.0.07 or earlier, your system is vulnerable to CVE-2020-15955.
CVE-2020-15955 can be exploited through a Man-in-the-Middle (MitM) attack that injects commands during the STARTTLS handshake.