This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Dovecot First view 2008-03-06
Product Dovecot Last view 2022-07-17
Version 1.0.10 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:dovecot:dovecot

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
8.8 2022-07-17 CVE-2022-30550

An issue was discovered in the auth component in Dovecot 2.2 and 2.3 before 2.3.20. When two passdb configuration entries exist with the same driver and args settings, incorrect username_filter and mechanism settings can be applied to passdb definitions. These incorrectly applied settings can lead to an unintended security configuration and can permit privilege escalation in certain configurations. The documentation does not advise against the use of passdb definitions that have the same driver and args settings. One such configuration would be where an administrator wishes to use the same PAM configuration or passwd file for both normal and master users but use the username_filter setting to restrict which of the users is able to be a master user.

4.8 2021-06-28 CVE-2021-33515

The submission service in Dovecot before 2.3.15 allows STARTTLS command injection in lib-smtp. Sensitive information can be redirected to an attacker-controlled address.

5.5 2021-06-28 CVE-2021-29157

Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver.

4.3 2021-06-28 CVE-2020-28200

The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled Resource Consumption, as demonstrated by a situation with a complex regular expression for the regex extension.

7.5 2021-01-04 CVE-2020-25275

Dovecot before 2.3.13 has Improper Input Validation in lda, lmtp, and imap, leading to an application crash via a crafted email message with certain choices for ten thousand MIME parts.

6.8 2021-01-04 CVE-2020-24386

An issue was discovered in Dovecot before 2.3.13. By using IMAP IDLE, an authenticated attacker can trigger unhibernation via attacker-controlled parameters, leading to access to other users' email messages (and path disclosure).

7.5 2020-08-12 CVE-2020-12674

In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.

7.5 2020-08-12 CVE-2020-12673

In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.

7.5 2020-08-12 CVE-2020-12100

In Dovecot before 2.3.11.3, uncontrolled recursion in submission, lmtp, and lda allows remote attackers to cause a denial of service (resource consumption) via a crafted e-mail message with deeply nested MIME parts.

5.3 2020-05-18 CVE-2020-10967

In Dovecot before 2.3.10.1, remote unauthenticated attackers can crash the lmtp or submission process by sending mail with an empty localpart.

5.3 2020-05-18 CVE-2020-10958

In Dovecot before 2.3.10.1, a crafted SMTP/LMTP message triggers an unauthenticated use-after-free bug in submission-login, submission, or lmtp, and can lead to a crash under circumstances involving many newlines after a command.

7.5 2020-05-18 CVE-2020-10957

In Dovecot before 2.3.10.1, unauthenticated sending of malformed parameters to a NOOP command causes a NULL Pointer Dereference and crash in submission-login, submission, or lmtp.

5.3 2020-02-12 CVE-2020-7957

The IMAP and LMTP components in Dovecot 2.3.9 before 2.3.9.3 mishandle snippet generation when many characters must be read to compute the snippet and a trailing > character exists. This causes a denial of service in which the recipient cannot read all of their messages.

7.5 2020-02-12 CVE-2020-7046

lib-smtp in submission-login and lmtp in Dovecot 2.3.9 before 2.3.9.3 mishandles truncated UTF-8 data in command parameters, as demonstrated by the unauthenticated triggering of a submission-login infinite loop.

5.3 2019-12-13 CVE-2019-19722

In Dovecot before 2.3.9.2, an attacker can crash a push-notification driver with a crafted email when push notifications are used, because of a NULL Pointer Dereference. The email must use a group address as either the sender or the recipient.

9.8 2019-08-29 CVE-2019-11500

In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution.

7.5 2019-05-08 CVE-2019-11499

In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login component crashes if AUTH PLAIN is attempted over a TLS secured channel with an unacceptable authentication message.

7.5 2019-05-08 CVE-2019-11494

In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login service crashes when the client disconnects prematurely during the AUTH command.

7.5 2019-04-24 CVE-2019-10691

The JSON encoder in Dovecot before 2.3.5.2 allows attackers to repeatedly crash the authentication service by attempting to authenticate with an invalid UTF-8 sequence as the username.

7.8 2019-03-28 CVE-2019-7524

In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.

6.8 2019-03-27 CVE-2019-3814

It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.

7.5 2018-06-21 CVE-2017-2669

Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially crafted %variable fields could result in excessive memory usage causing the process to crash (and restart), or excessive CPU usage causing all authentications to hang.

5.9 2018-03-02 CVE-2017-15130

A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart.

7.5 2018-01-25 CVE-2017-15132

A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion.

5.9 2017-09-19 CVE-2015-3420

The ssl-proxy-openssl.c function in Dovecot before 2.2.17, when SSLv3 is disabled, allow remote attackers to cause a denial of service (login process crash) via vectors related to handshake failures.

CWE : Common Weakness Enumeration

%idName
20% (6) CWE-20 Improper Input Validation
10% (3) CWE-476 NULL Pointer Dereference
6% (2) CWE-295 Certificate Issues
6% (2) CWE-287 Improper Authentication
6% (2) CWE-125 Out-of-bounds Read
6% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
3% (1) CWE-787 Out-of-bounds Write
3% (1) CWE-772 Missing Release of Resource after Effective Lifetime
3% (1) CWE-770 Allocation of Resources Without Limits or Throttling
3% (1) CWE-732 Incorrect Permission Assignment for Critical Resource
3% (1) CWE-674 Uncontrolled Recursion
3% (1) CWE-416 Use After Free
3% (1) CWE-264 Permissions, Privileges, and Access Controls
3% (1) CWE-255 Credentials Management
3% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
3% (1) CWE-77 Improper Sanitization of Special Elements used in a Command ('Comma...
3% (1) CWE-59 Improper Link Resolution Before File Access ('Link Following')
3% (1) CWE-16 Configuration

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs
CAPEC-13 Subverting Environment Variable Values
CAPEC-17 Accessing, Modifying or Executing Executable Files
CAPEC-39 Manipulating Opaque Client-based Data Tokens
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-51 Poison Web Service Registry
CAPEC-59 Session Credential Falsification through Prediction
CAPEC-60 Reusing Session IDs (aka Session Replay)
CAPEC-61 Session Fixation
CAPEC-62 Cross Site Request Forgery (aka Session Riding)
CAPEC-76 Manipulating Input to File System Calls
CAPEC-77 Manipulating User-Controlled Variables
CAPEC-87 Forceful Browsing
CAPEC-104 Cross Zone Scripting
CAPEC-122 Exploitation of Authorization
CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels
CAPEC-232 Exploitation of Privilege/Trust
CAPEC-234 Hijacking a privileged process

Open Source Vulnerability Database (OSVDB)

id Description
60316 Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
49918 Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
49099 Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
49098 Dovecot ACL Plugin Negative Access Rights Bypass
43137 Dovecot mail_extra_groups Symlink File Manipulation
42979 Dovecot passdbs Argument Injection Authentication Bypass

ExploitDB Exploits

id Description
5257 Dovecot IMAP 1.0.10 <= 1.1rc2 Remote Email Disclosure Exploit

OpenVAS Exploits

id Description
2012-02-12 Name : Gentoo Security Advisory GLSA 201110-04 (Dovecot)
File : nvt/glsa_201110_04.nasl
2009-12-14 Name : FreeBSD Ports: dovecot
File : nvt/freebsd_dovecot2.nasl
2009-12-02 Name : Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
File : nvt/gb_dovecot_base_dir_sec_bypass_vuln.nasl
2009-10-06 Name : Ubuntu USN-838-1 (dovecot)
File : nvt/ubuntu_838_1.nasl
2009-06-05 Name : Ubuntu USN-698-1 (nagios)
File : nvt/ubuntu_698_1.nasl
2009-04-09 Name : Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
File : nvt/gb_mandriva_MDVSA_2008_232.nasl
2009-03-23 Name : Ubuntu Update for dovecot vulnerabilities USN-593-1
File : nvt/gb_ubuntu_USN_593_1.nasl
2009-03-06 Name : RedHat Update for dovecot RHSA-2008:0297-02
File : nvt/gb_RHSA-2008_0297-02_dovecot.nasl
2009-02-18 Name : SuSE Security Summary SUSE-SR:2009:004
File : nvt/suse_sr_2009_004.nasl
2009-02-17 Name : Fedora Update for dovecot FEDORA-2008-9232
File : nvt/gb_fedora_2008_9232_dovecot_fc8.nasl
2009-02-17 Name : Fedora Update for dovecot FEDORA-2008-9202
File : nvt/gb_fedora_2008_9202_dovecot_fc9.nasl
2009-02-16 Name : Fedora Update for dovecot FEDORA-2008-2475
File : nvt/gb_fedora_2008_2475_dovecot_fc7.nasl
2009-02-16 Name : Fedora Update for dovecot FEDORA-2008-2464
File : nvt/gb_fedora_2008_2464_dovecot_fc8.nasl
2009-01-26 Name : RedHat Security Advisory RHSA-2009:0205
File : nvt/RHSA_2009_0205.nasl
2008-12-29 Name : Ubuntu USN-697-1 (imlib2)
File : nvt/ubuntu_697_1.nasl
2008-12-29 Name : Ubuntu USN-698-2 (nagios3)
File : nvt/ubuntu_698_2.nasl
2008-12-29 Name : Ubuntu USN-699-1 (blender)
File : nvt/ubuntu_699_1.nasl
2008-12-23 Name : Gentoo Security Advisory GLSA 200812-16 (dovecot)
File : nvt/glsa_200812_16.nasl
2008-12-10 Name : FreeBSD Ports: dovecot-managesieve
File : nvt/freebsd_dovecot-managesieve.nasl
2008-11-24 Name : FreeBSD Ports: dovecot
File : nvt/freebsd_dovecot1.nasl
2008-10-17 Name : Dovecot ACL Plugin Security Bypass Vulnerabilities
File : nvt/gb_dovecot_mult_sec_bypass_vuln.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200803-25 (dovecot)
File : nvt/glsa_200803_25.nasl
2008-09-04 Name : FreeBSD Ports: dovecot
File : nvt/freebsd_dovecot0.nasl
2008-03-19 Name : Debian Security Advisory DSA 1516-1 (dovecot)
File : nvt/deb_1516_1.nasl

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-04-02 Name: The remote Debian host is missing a security update.
File: debian_DLA-1333.nasl - Type: ACT_GATHER_INFO
2018-03-20 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2018-1057.nasl - Type: ACT_GATHER_INFO
2018-03-20 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2018-1056.nasl - Type: ACT_GATHER_INFO
2018-03-05 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4130.nasl - Type: ACT_GATHER_INFO
2018-01-29 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_92b8b284a3a241b1956cf9cf8b74f500.nasl - Type: ACT_GATHER_INFO
2017-07-17 Name: The remote Fedora host is missing a security update.
File: fedora_2017-e8b639c286.nasl - Type: ACT_GATHER_INFO
2017-07-07 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-787.nasl - Type: ACT_GATHER_INFO
2017-05-12 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-1250-1.nasl - Type: ACT_GATHER_INFO
2017-05-01 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_a8c8001b216c11e780aa005056925db4.nasl - Type: ACT_GATHER_INFO
2017-04-28 Name: The remote Fedora host is missing a security update.
File: fedora_2017-da4ed58fd5.nasl - Type: ACT_GATHER_INFO
2017-04-27 Name: The remote Fedora host is missing a security update.
File: fedora_2017-6ef28e38d6.nasl - Type: ACT_GATHER_INFO
2017-04-12 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3828.nasl - Type: ACT_GATHER_INFO
2017-04-12 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-3258-2.nasl - Type: ACT_GATHER_INFO
2017-04-11 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-3258-1.nasl - Type: ACT_GATHER_INFO
2017-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2016-daf90926d4.nasl - Type: ACT_GATHER_INFO
2016-12-22 Name: The remote Fedora host is missing a security update.
File: fedora_2016-bb22a24d3d.nasl - Type: ACT_GATHER_INFO
2015-05-20 Name: The remote Fedora host is missing a security update.
File: fedora_2015-7159.nasl - Type: ACT_GATHER_INFO
2015-05-20 Name: The remote Fedora host is missing a security update.
File: fedora_2015-7089.nasl - Type: ACT_GATHER_INFO
2015-05-04 Name: The remote Fedora host is missing a security update.
File: fedora_2015-7156.nasl - Type: ACT_GATHER_INFO
2012-08-01 Name: The remote Scientific Linux host is missing a security update.
File: sl_20080521_dovecot_on_SL5_x.nasl - Type: ACT_GATHER_INFO
2012-08-01 Name: The remote Scientific Linux host is missing a security update.
File: sl_20090120_dovecot_on_SL5_x.nasl - Type: ACT_GATHER_INFO
2011-10-11 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201110-04.nasl - Type: ACT_GATHER_INFO
2010-07-30 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2009-306.nasl - Type: ACT_GATHER_INFO
2010-01-19 Name: The remote openSUSE host is missing a security update.
File: suse_11_2_dovecot12-100118.nasl - Type: ACT_GATHER_INFO
2009-12-11 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_30211c45e52a11deb5cd00e0815b8da8.nasl - Type: ACT_GATHER_INFO