This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Dovecot First view 2013-12-09
Product Dovecot Last view 2022-07-17
Version 2.2 Type Application
Update rc1  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:dovecot:dovecot

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
8.8 2022-07-17 CVE-2022-30550

An issue was discovered in the auth component in Dovecot 2.2 and 2.3 before 2.3.20. When two passdb configuration entries exist with the same driver and args settings, incorrect username_filter and mechanism settings can be applied to passdb definitions. These incorrectly applied settings can lead to an unintended security configuration and can permit privilege escalation in certain configurations. The documentation does not advise against the use of passdb definitions that have the same driver and args settings. One such configuration would be where an administrator wishes to use the same PAM configuration or passwd file for both normal and master users but use the username_filter setting to restrict which of the users is able to be a master user.

4.8 2021-06-28 CVE-2021-33515

The submission service in Dovecot before 2.3.15 allows STARTTLS command injection in lib-smtp. Sensitive information can be redirected to an attacker-controlled address.

5.5 2021-06-28 CVE-2021-29157

Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver.

4.3 2021-06-28 CVE-2020-28200

The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled Resource Consumption, as demonstrated by a situation with a complex regular expression for the regex extension.

7.5 2021-01-04 CVE-2020-25275

Dovecot before 2.3.13 has Improper Input Validation in lda, lmtp, and imap, leading to an application crash via a crafted email message with certain choices for ten thousand MIME parts.

6.8 2021-01-04 CVE-2020-24386

An issue was discovered in Dovecot before 2.3.13. By using IMAP IDLE, an authenticated attacker can trigger unhibernation via attacker-controlled parameters, leading to access to other users' email messages (and path disclosure).

7.5 2020-08-12 CVE-2020-12674

In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.

7.5 2020-08-12 CVE-2020-12673

In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.

7.5 2020-08-12 CVE-2020-12100

In Dovecot before 2.3.11.3, uncontrolled recursion in submission, lmtp, and lda allows remote attackers to cause a denial of service (resource consumption) via a crafted e-mail message with deeply nested MIME parts.

5.3 2020-05-18 CVE-2020-10967

In Dovecot before 2.3.10.1, remote unauthenticated attackers can crash the lmtp or submission process by sending mail with an empty localpart.

5.3 2020-05-18 CVE-2020-10958

In Dovecot before 2.3.10.1, a crafted SMTP/LMTP message triggers an unauthenticated use-after-free bug in submission-login, submission, or lmtp, and can lead to a crash under circumstances involving many newlines after a command.

7.5 2020-05-18 CVE-2020-10957

In Dovecot before 2.3.10.1, unauthenticated sending of malformed parameters to a NOOP command causes a NULL Pointer Dereference and crash in submission-login, submission, or lmtp.

5.3 2020-02-12 CVE-2020-7957

The IMAP and LMTP components in Dovecot 2.3.9 before 2.3.9.3 mishandle snippet generation when many characters must be read to compute the snippet and a trailing > character exists. This causes a denial of service in which the recipient cannot read all of their messages.

7.5 2020-02-12 CVE-2020-7046

lib-smtp in submission-login and lmtp in Dovecot 2.3.9 before 2.3.9.3 mishandles truncated UTF-8 data in command parameters, as demonstrated by the unauthenticated triggering of a submission-login infinite loop.

5.3 2019-12-13 CVE-2019-19722

In Dovecot before 2.3.9.2, an attacker can crash a push-notification driver with a crafted email when push notifications are used, because of a NULL Pointer Dereference. The email must use a group address as either the sender or the recipient.

9.8 2019-08-29 CVE-2019-11500

In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution.

7.5 2019-05-08 CVE-2019-11499

In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login component crashes if AUTH PLAIN is attempted over a TLS secured channel with an unacceptable authentication message.

7.5 2019-05-08 CVE-2019-11494

In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login service crashes when the client disconnects prematurely during the AUTH command.

7.5 2019-04-24 CVE-2019-10691

The JSON encoder in Dovecot before 2.3.5.2 allows attackers to repeatedly crash the authentication service by attempting to authenticate with an invalid UTF-8 sequence as the username.

7.8 2019-03-28 CVE-2019-7524

In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.

6.8 2019-03-27 CVE-2019-3814

It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.

7.5 2018-06-21 CVE-2017-2669

Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially crafted %variable fields could result in excessive memory usage causing the process to crash (and restart), or excessive CPU usage causing all authentications to hang.

5.9 2018-03-02 CVE-2017-15130

A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart.

7.5 2018-01-25 CVE-2017-15132

A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion.

5.9 2017-09-19 CVE-2015-3420

The ssl-proxy-openssl.c function in Dovecot before 2.2.17, when SSLv3 is disabled, allow remote attackers to cause a denial of service (login process crash) via vectors related to handshake failures.

CWE : Common Weakness Enumeration

%idName
25% (6) CWE-20 Improper Input Validation
12% (3) CWE-476 NULL Pointer Dereference
12% (3) CWE-287 Improper Authentication
8% (2) CWE-295 Certificate Issues
8% (2) CWE-125 Out-of-bounds Read
4% (1) CWE-787 Out-of-bounds Write
4% (1) CWE-772 Missing Release of Resource after Effective Lifetime
4% (1) CWE-770 Allocation of Resources Without Limits or Throttling
4% (1) CWE-674 Uncontrolled Recursion
4% (1) CWE-416 Use After Free
4% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
4% (1) CWE-77 Improper Sanitization of Special Elements used in a Command ('Comma...
4% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-04-02 Name: The remote Debian host is missing a security update.
File: debian_DLA-1333.nasl - Type: ACT_GATHER_INFO
2018-03-20 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2018-1057.nasl - Type: ACT_GATHER_INFO
2018-03-20 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2018-1056.nasl - Type: ACT_GATHER_INFO
2018-03-05 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4130.nasl - Type: ACT_GATHER_INFO
2018-01-29 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_92b8b284a3a241b1956cf9cf8b74f500.nasl - Type: ACT_GATHER_INFO
2017-07-17 Name: The remote Fedora host is missing a security update.
File: fedora_2017-e8b639c286.nasl - Type: ACT_GATHER_INFO
2017-07-07 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-787.nasl - Type: ACT_GATHER_INFO
2017-05-12 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-1250-1.nasl - Type: ACT_GATHER_INFO
2017-05-01 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_a8c8001b216c11e780aa005056925db4.nasl - Type: ACT_GATHER_INFO
2017-04-28 Name: The remote Fedora host is missing a security update.
File: fedora_2017-da4ed58fd5.nasl - Type: ACT_GATHER_INFO
2017-04-27 Name: The remote Fedora host is missing a security update.
File: fedora_2017-6ef28e38d6.nasl - Type: ACT_GATHER_INFO
2017-04-12 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-3258-2.nasl - Type: ACT_GATHER_INFO
2017-04-12 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3828.nasl - Type: ACT_GATHER_INFO
2017-04-11 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-3258-1.nasl - Type: ACT_GATHER_INFO
2017-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2016-daf90926d4.nasl - Type: ACT_GATHER_INFO
2016-12-22 Name: The remote Fedora host is missing a security update.
File: fedora_2016-bb22a24d3d.nasl - Type: ACT_GATHER_INFO
2015-05-20 Name: The remote Fedora host is missing a security update.
File: fedora_2015-7159.nasl - Type: ACT_GATHER_INFO
2015-05-20 Name: The remote Fedora host is missing a security update.
File: fedora_2015-7089.nasl - Type: ACT_GATHER_INFO
2015-05-04 Name: The remote Fedora host is missing a security update.
File: fedora_2015-7156.nasl - Type: ACT_GATHER_INFO
2015-03-30 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-113.nasl - Type: ACT_GATHER_INFO
2014-12-09 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201412-03.nasl - Type: ACT_GATHER_INFO
2014-10-12 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2014-386.nasl - Type: ACT_GATHER_INFO
2014-06-26 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20140625_dovecot_on_SL6_x.nasl - Type: ACT_GATHER_INFO
2014-06-26 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2014-0790.nasl - Type: ACT_GATHER_INFO
2014-06-26 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2014-0790.nasl - Type: ACT_GATHER_INFO