First published: Tue Aug 03 2021(Updated: )
An issue was discovered in the POP3 component of Courier Mail Server before 1.1.5. Meddler-in-the-middle attackers can pipeline commands after the POP3 STLS command, injecting plaintext commands into an encrypted user session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Courier Mail Server | <1.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38084 is classified as a high severity vulnerability due to its potential for exploiting encrypted sessions.
The recommended fix for CVE-2021-38084 is to upgrade to Courier Mail Server version 1.1.5 or later.
CVE-2021-38084 allows attackers to inject plaintext commands into an encrypted user session, compromising data confidentiality.
CVE-2021-38084 enables meddler-in-the-middle attacks that can manipulate user sessions in real-time.
Yes, CVE-2021-38084 can be exploited remotely by attackers who can intercept the POP3 communications.