A vulnerability has been reported in Oracle Communications Messaging Server, which can be exploited by malicious people to manipulate certain data.
The vulnerability is caused due to the TLS implementation within the SMTP, IMAP, and POP servers not properly clearing transport layer buffers when upgrading from plaintext to ciphertext after receiving the "STARTTLS" command.
The vulnerability is reported in the following products:
* Oracle Communications Messaging Exchange Server 7.0
* Sun Java System Messaging Server 6.3
Solution: Apply updates (please see the vendor's advisory for details).
Provided and/or discovered by: It is currently unclear who reported this vulnerability as the Oracle Critical Patch Update for April 2011 only provides a bundled list of credits. This section will be updated when/if the original reporter provides more information.
Original Advisory: Oracle:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Oracle Communications Messaging Server "STARTTLS" Plaintext Injection Vulnerabil
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.