X-Git-Url: https://git.exim.org/exim-website.git/blobdiff_plain/2fae8e2e6a9d5606ac7eb7c94003d59756a1281a..ba0da048589d0c808f3161ea03de19d3bb2adc17:/templates/static/doc/security/CVE-2021-38371.txt diff --git a/templates/static/doc/security/CVE-2021-38371.txt b/templates/static/doc/security/CVE-2021-38371.txt index dfb748b..f24609a 100644 --- a/templates/static/doc/security/CVE-2021-38371.txt +++ b/templates/static/doc/security/CVE-2021-38371.txt @@ -5,6 +5,9 @@ Reporter: Damian Poddebniak, Fabian Ising, Hanno Böck, and Sebastian Schinzel Reference: https://nostarttls.secvuln.info/ Issue: Possible MitM attack on STARTTLS when Exim is *sending* email. +** The Exim developers do not consider this issue as a security problem. +** Additionally, we do not have any feedback about a successful attack +** using the scenario described below. Conditions to be vulnerable ===========================