Package: courier-imap
Version: 4.10.0-20120615-1

Courier IMAP contains a flaw in its STLS implementation that could allow
a remote unauthenticated attacker to inject commands during the plain
text protocol phase that will be executed during the ciphertext protocol
phase.

E.g.

a1 STARTTLS\r\na2 CAPABILITY\r\n

Sent in a single packet to port 143 makes courier-imap respond with:

a1 OK Begin SSL/TLS negotiation now.
a2 OK CAPABILITY completed

I suggest sanitising the data input of the STARTTLS negotiation.

I am using Debian GNU/Linux 7.11, kernel 3.2.0-4-amd64.

Reply via email to