Multiple Vendors STARTTLS Implementation Plaintext Arbitrary Command Injection Vulnerability

Summary
Multiple vendors' implementations of STARTTLS are prone to a vulnerability that lets attackers inject arbitrary commands.
Impact
An attacker can exploit this issue to execute arbitrary commands in the context of the user running the application. Successful exploits can allow attackers to obtain email usernames and passwords.
Solution
Updates are available.
Affected
The following vendors are affected: Ipswitch Kerio Postfix Qmail-TLS Oracle SCO Group spamdyke ISC
Detection
Send a special crafted STARTTLS request and check the response.
References