In s/qmail up to and including 4.0.07, an active MitM can inject arbitrary plaintext commands into a STARTTLS encrypted session between an SMTP client and s/qmail. This allows e-mail messages and user credentials to be sent to the MitM attacker.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
fehcom s\\/qmail |