Multiple vulnerabilities in Dovecot



Published: 2011-05-25 | Updated: 2020-08-11
Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2011-1929
CVE-2011-2166
CVE-2011-2167
CWE-ID CWE-20
CWE-16
CWE-22
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Dovecot
Server applications / Mail servers

Vendor Dovecot

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU45025

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2011-1929

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dovecot: 1.2.0 - 2.0.12

External links

http://dovecot.org/pipermail/dovecot/2011-May/059085.html
http://dovecot.org/pipermail/dovecot/2011-May/059086.html
http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html
http://openwall.com/lists/oss-security/2011/05/18/4
http://openwall.com/lists/oss-security/2011/05/19/3
http://openwall.com/lists/oss-security/2011/05/19/6
http://osvdb.org/72495
http://secunia.com/advisories/44683
http://secunia.com/advisories/44712
http://secunia.com/advisories/44756
http://secunia.com/advisories/44771
http://secunia.com/advisories/44827
http://www.debian.org/security/2011/dsa-2252
http://www.dovecot.org/doc/NEWS-1.2
http://www.dovecot.org/doc/NEWS-2.0
http://www.mandriva.com/security/advisories?name=MDVSA-2011:101
http://www.redhat.com/support/errata/RHSA-2011-1187.html
http://www.securityfocus.com/bid/47930
http://www.ubuntu.com/usn/USN-1143-1
http://bugzilla.redhat.com/show_bug.cgi?id=706286
http://exchange.xforce.ibmcloud.com/vulnerabilities/67589
http://hermes.opensuse.org/messages/8581790


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Configuration

EUVDB-ID: #VU45026

Risk: Low

CVSSv3.1: 3 [CVSS:3.1/AV:N/AC:L/PR:/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2011-2166

CWE-ID: CWE-16 - Configuration

Exploit availability: No

Description

The vulnerability allows a remote #AU# to read and manipulate data.

script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dovecot: 2.0.0 - 2.0.12

External links

http://dovecot.org/pipermail/dovecot/2011-May/059085.html
http://openwall.com/lists/oss-security/2011/05/18/4
http://rhn.redhat.com/errata/RHSA-2013-0520.html
http://secunia.com/advisories/52311
http://www.dovecot.org/doc/NEWS-2.0
http://www.securityfocus.com/bid/48003
http://exchange.xforce.ibmcloud.com/vulnerabilities/67675


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Path traversal

EUVDB-ID: #VU45027

Risk: Low

CVSSv3.1: 3 [CVSS:3.1/AV:N/AC:L/PR:/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2011-2167

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote #AU# to read and manipulate data.

script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dovecot: 2.0.0 - 2.0.12

External links

http://dovecot.org/pipermail/dovecot/2011-May/059085.html
http://openwall.com/lists/oss-security/2011/05/18/4
http://rhn.redhat.com/errata/RHSA-2013-0520.html
http://secunia.com/advisories/52311
http://www.dovecot.org/doc/NEWS-2.0
http://www.securityfocus.com/bid/48003
http://exchange.xforce.ibmcloud.com/vulnerabilities/67674


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###