Denial of service in Dovecot



Published: 2018-02-28
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-14461
CWE-ID CWE-125
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Dovecot
Server applications / Mail servers

Vendor Dovecot

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Out-of-bounds read

EUVDB-ID: #VU10838

Risk: Medium

CVSSv3.1: 6.2 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-14461

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information or cause DoS condition on the target system.

The weakness exists due to improper parsing of crafted email messages. A remote attacker can send a specially crafted email message over SMTP, trick the victim into opening it, trigger an out-of-bounds read and gain access to potentially sensitive information or cause the service to crash.

Mitigation

Update to version 2.2.34.

Vulnerable software versions

Dovecot: 2.2.33.2

External links

http://www.dovecot.org/list/dovecot-news/2018-February/000370.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###