Show plain JSON{"id": "CVE-2011-2165", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-05-23T22:55:01.553", "references": [{"url": "http://secunia.com/advisories/44753", "source": "cve@mitre.org"}, {"url": "http://www.kb.cert.org/vuls/id/555316", "tags": ["US Government Resource"], "source": "cve@mitre.org"}, {"url": "http://www.kb.cert.org/vuls/id/MAPG-8D9M75", "tags": ["US Government Resource"], "source": "cve@mitre.org"}, {"url": "http://www.watchguard.com/support/release-notes/xcs/9/en-US/EN_ReleaseNotes_XCS_9_1_1/EN_ReleaseNotes_WG_XCS_9_1_TLS_Hotfix.pdf", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67729", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/44753", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.kb.cert.org/vuls/id/555316", "tags": ["US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.kb.cert.org/vuls/id/MAPG-8D9M75", "tags": ["US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.watchguard.com/support/release-notes/xcs/9/en-US/EN_ReleaseNotes_XCS_9_1_1/EN_ReleaseNotes_WG_XCS_9_1_TLS_Hotfix.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67729", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "The STARTTLS implementation in WatchGuard XCS 9.0 and 9.1 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a \"plaintext command injection\" attack, a similar issue to CVE-2011-0411."}, {"lang": "es", "value": "La implementaci\u00f3n de STARTTLS en WatchGuard XCS v9.0 y v9.1 no restringe de forma correcta el b\u00fafer de I/O, lo que permite que mediante ataques de \"hombre en medio\", se inserten comandos el las sesiones SMTP cifradas, enviando un comando en texto plano, que es procesado despu\u00e9s de TLS en su lugar, en relaci\u00f3n a una \" inyecci\u00f3n de comandos de texto claro \" ataque, un problema similar a CVE-2011-0411."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:watchguard:xcs:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB42401A-9322-413F-8F75-128EBFC9631D"}, {"criteria": "cpe:2.3:a:watchguard:xcs:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "400ED41A-5F98-4641-85C3-C8509B4D9767"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}