
CVE-2020-3811 – Debian Security Advisory 4692-1
https://notcve.org/view.php?id=CVE-2020-3811
21 May 2020 — qmail-verify as used in netqmail 1.06 is prone to a mail-address verification bypass vulnerability. qmail-verify como es usado en netqmail versión 1.06 es propenso a una vulnerabilidad de omisión de verificación de dirección de correo. It was discovered that netqmail did not properly handle certain input. Both remote and local attackers could use this vulnerability to cause netqmail to crash or execute arbitrary code. It was discovered that netqmail did not properly handle certain input when validating emai... • https://packetstorm.news/files/id/157805 • CWE-665: Improper Initialization CWE-863: Incorrect Authorization •

CVE-2020-3812 – Debian Security Advisory 4692-1
https://notcve.org/view.php?id=CVE-2020-3812
21 May 2020 — qmail-verify as used in netqmail 1.06 is prone to an information disclosure vulnerability. A local attacker can test for the existence of files and directories anywhere in the filesystem because qmail-verify runs as root and tests for the existence of files in the attacker's home directory, without dropping its privileges first. qmail-verify como es usado en netqmail versión 1.06, es propenso a una vulnerabilidad de divulgación de información. Un atacante local puede probar la existencia de archivos y direc... • https://packetstorm.news/files/id/157805 • CWE-269: Improper Privilege Management •

CVE-2011-1431
https://notcve.org/view.php?id=CVE-2011-1431
16 Mar 2011 — The STARTTLS implementation in qmail-smtpd.c in qmail-smtpd in the netqmail-1.06-tls patch for netqmail 1.06 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. La implementación qmail-smtpd.c en qmail-smtpd en el parche netqmail-1.06-tls para netqmail v1.06 no restringe el b... • http://inoa.net/qmail-tls/vu555316.patch •