Summary
Detail | |||
---|---|---|---|
Vendor | Dovecot | First view | 2008-03-06 |
Product | Dovecot | Last view | 2022-07-17 |
Version | 1.0.10 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:dovecot:dovecot |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.8 | 2022-07-17 | CVE-2022-30550 | An issue was discovered in the auth component in Dovecot 2.2 and 2.3 before 2.3.20. When two passdb configuration entries exist with the same driver and args settings, incorrect username_filter and mechanism settings can be applied to passdb definitions. These incorrectly applied settings can lead to an unintended security configuration and can permit privilege escalation in certain configurations. The documentation does not advise against the use of passdb definitions that have the same driver and args settings. One such configuration would be where an administrator wishes to use the same PAM configuration or passwd file for both normal and master users but use the username_filter setting to restrict which of the users is able to be a master user. |
4.8 | 2021-06-28 | CVE-2021-33515 | The submission service in Dovecot before 2.3.15 allows STARTTLS command injection in lib-smtp. Sensitive information can be redirected to an attacker-controlled address. |
5.5 | 2021-06-28 | CVE-2021-29157 | Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver. |
4.3 | 2021-06-28 | CVE-2020-28200 | The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled Resource Consumption, as demonstrated by a situation with a complex regular expression for the regex extension. |
7.5 | 2021-01-04 | CVE-2020-25275 | Dovecot before 2.3.13 has Improper Input Validation in lda, lmtp, and imap, leading to an application crash via a crafted email message with certain choices for ten thousand MIME parts. |
6.8 | 2021-01-04 | CVE-2020-24386 | An issue was discovered in Dovecot before 2.3.13. By using IMAP IDLE, an authenticated attacker can trigger unhibernation via attacker-controlled parameters, leading to access to other users' email messages (and path disclosure). |
7.5 | 2020-08-12 | CVE-2020-12674 | In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled. |
7.5 | 2020-08-12 | CVE-2020-12673 | In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read. |
7.5 | 2020-08-12 | CVE-2020-12100 | In Dovecot before 2.3.11.3, uncontrolled recursion in submission, lmtp, and lda allows remote attackers to cause a denial of service (resource consumption) via a crafted e-mail message with deeply nested MIME parts. |
5.3 | 2020-05-18 | CVE-2020-10967 | In Dovecot before 2.3.10.1, remote unauthenticated attackers can crash the lmtp or submission process by sending mail with an empty localpart. |
5.3 | 2020-05-18 | CVE-2020-10958 | In Dovecot before 2.3.10.1, a crafted SMTP/LMTP message triggers an unauthenticated use-after-free bug in submission-login, submission, or lmtp, and can lead to a crash under circumstances involving many newlines after a command. |
7.5 | 2020-05-18 | CVE-2020-10957 | In Dovecot before 2.3.10.1, unauthenticated sending of malformed parameters to a NOOP command causes a NULL Pointer Dereference and crash in submission-login, submission, or lmtp. |
5.3 | 2020-02-12 | CVE-2020-7957 | The IMAP and LMTP components in Dovecot 2.3.9 before 2.3.9.3 mishandle snippet generation when many characters must be read to compute the snippet and a trailing > character exists. This causes a denial of service in which the recipient cannot read all of their messages. |
7.5 | 2020-02-12 | CVE-2020-7046 | lib-smtp in submission-login and lmtp in Dovecot 2.3.9 before 2.3.9.3 mishandles truncated UTF-8 data in command parameters, as demonstrated by the unauthenticated triggering of a submission-login infinite loop. |
5.3 | 2019-12-13 | CVE-2019-19722 | In Dovecot before 2.3.9.2, an attacker can crash a push-notification driver with a crafted email when push notifications are used, because of a NULL Pointer Dereference. The email must use a group address as either the sender or the recipient. |
9.8 | 2019-08-29 | CVE-2019-11500 | In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution. |
7.5 | 2019-05-08 | CVE-2019-11499 | In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login component crashes if AUTH PLAIN is attempted over a TLS secured channel with an unacceptable authentication message. |
7.5 | 2019-05-08 | CVE-2019-11494 | In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login service crashes when the client disconnects prematurely during the AUTH command. |
7.5 | 2019-04-24 | CVE-2019-10691 | The JSON encoder in Dovecot before 2.3.5.2 allows attackers to repeatedly crash the authentication service by attempting to authenticate with an invalid UTF-8 sequence as the username. |
7.8 | 2019-03-28 | CVE-2019-7524 | In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components. |
6.8 | 2019-03-27 | CVE-2019-3814 | It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users. |
7.5 | 2018-06-21 | CVE-2017-2669 | Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially crafted %variable fields could result in excessive memory usage causing the process to crash (and restart), or excessive CPU usage causing all authentications to hang. |
5.9 | 2018-03-02 | CVE-2017-15130 | A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart. |
7.5 | 2018-01-25 | CVE-2017-15132 | A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion. |
5.9 | 2017-09-19 | CVE-2015-3420 | The ssl-proxy-openssl.c function in Dovecot before 2.2.17, when SSLv3 is disabled, allow remote attackers to cause a denial of service (login process crash) via vectors related to handshake failures. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
20% (6) | CWE-20 | Improper Input Validation |
10% (3) | CWE-476 | NULL Pointer Dereference |
6% (2) | CWE-295 | Certificate Issues |
6% (2) | CWE-287 | Improper Authentication |
6% (2) | CWE-125 | Out-of-bounds Read |
6% (2) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
3% (1) | CWE-787 | Out-of-bounds Write |
3% (1) | CWE-772 | Missing Release of Resource after Effective Lifetime |
3% (1) | CWE-770 | Allocation of Resources Without Limits or Throttling |
3% (1) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
3% (1) | CWE-674 | Uncontrolled Recursion |
3% (1) | CWE-416 | Use After Free |
3% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
3% (1) | CWE-255 | Credentials Management |
3% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
3% (1) | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Comma... |
3% (1) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
3% (1) | CWE-16 | Configuration |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-1 | Accessing Functionality Not Properly Constrained by ACLs |
CAPEC-13 | Subverting Environment Variable Values |
CAPEC-17 | Accessing, Modifying or Executing Executable Files |
CAPEC-39 | Manipulating Opaque Client-based Data Tokens |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-51 | Poison Web Service Registry |
CAPEC-59 | Session Credential Falsification through Prediction |
CAPEC-60 | Reusing Session IDs (aka Session Replay) |
CAPEC-61 | Session Fixation |
CAPEC-62 | Cross Site Request Forgery (aka Session Riding) |
CAPEC-76 | Manipulating Input to File System Calls |
CAPEC-77 | Manipulating User-Controlled Variables |
CAPEC-87 | Forceful Browsing |
CAPEC-104 | Cross Zone Scripting |
CAPEC-122 | Exploitation of Authorization |
CAPEC-180 | Exploiting Incorrectly Configured Access Control Security Levels |
CAPEC-232 | Exploitation of Privilege/Trust |
CAPEC-234 | Hijacking a privileged process |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
60316 | Dovecot base_dir Directory Permission Weakness Local Privilege Escalation |
49918 | Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation |
49099 | Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass |
49098 | Dovecot ACL Plugin Negative Access Rights Bypass |
43137 | Dovecot mail_extra_groups Symlink File Manipulation |
42979 | Dovecot passdbs Argument Injection Authentication Bypass |
ExploitDB Exploits
id | Description |
---|---|
5257 | Dovecot IMAP 1.0.10 <= 1.1rc2 Remote Email Disclosure Exploit |
OpenVAS Exploits
id | Description |
---|---|
2012-02-12 | Name : Gentoo Security Advisory GLSA 201110-04 (Dovecot) File : nvt/glsa_201110_04.nasl |
2009-12-14 | Name : FreeBSD Ports: dovecot File : nvt/freebsd_dovecot2.nasl |
2009-12-02 | Name : Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability File : nvt/gb_dovecot_base_dir_sec_bypass_vuln.nasl |
2009-10-06 | Name : Ubuntu USN-838-1 (dovecot) File : nvt/ubuntu_838_1.nasl |
2009-06-05 | Name : Ubuntu USN-698-1 (nagios) File : nvt/ubuntu_698_1.nasl |
2009-04-09 | Name : Mandriva Update for dovecot MDVSA-2008:232 (dovecot) File : nvt/gb_mandriva_MDVSA_2008_232.nasl |
2009-03-23 | Name : Ubuntu Update for dovecot vulnerabilities USN-593-1 File : nvt/gb_ubuntu_USN_593_1.nasl |
2009-03-06 | Name : RedHat Update for dovecot RHSA-2008:0297-02 File : nvt/gb_RHSA-2008_0297-02_dovecot.nasl |
2009-02-18 | Name : SuSE Security Summary SUSE-SR:2009:004 File : nvt/suse_sr_2009_004.nasl |
2009-02-17 | Name : Fedora Update for dovecot FEDORA-2008-9232 File : nvt/gb_fedora_2008_9232_dovecot_fc8.nasl |
2009-02-17 | Name : Fedora Update for dovecot FEDORA-2008-9202 File : nvt/gb_fedora_2008_9202_dovecot_fc9.nasl |
2009-02-16 | Name : Fedora Update for dovecot FEDORA-2008-2475 File : nvt/gb_fedora_2008_2475_dovecot_fc7.nasl |
2009-02-16 | Name : Fedora Update for dovecot FEDORA-2008-2464 File : nvt/gb_fedora_2008_2464_dovecot_fc8.nasl |
2009-01-26 | Name : RedHat Security Advisory RHSA-2009:0205 File : nvt/RHSA_2009_0205.nasl |
2008-12-29 | Name : Ubuntu USN-697-1 (imlib2) File : nvt/ubuntu_697_1.nasl |
2008-12-29 | Name : Ubuntu USN-698-2 (nagios3) File : nvt/ubuntu_698_2.nasl |
2008-12-29 | Name : Ubuntu USN-699-1 (blender) File : nvt/ubuntu_699_1.nasl |
2008-12-23 | Name : Gentoo Security Advisory GLSA 200812-16 (dovecot) File : nvt/glsa_200812_16.nasl |
2008-12-10 | Name : FreeBSD Ports: dovecot-managesieve File : nvt/freebsd_dovecot-managesieve.nasl |
2008-11-24 | Name : FreeBSD Ports: dovecot File : nvt/freebsd_dovecot1.nasl |
2008-10-17 | Name : Dovecot ACL Plugin Security Bypass Vulnerabilities File : nvt/gb_dovecot_mult_sec_bypass_vuln.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200803-25 (dovecot) File : nvt/glsa_200803_25.nasl |
2008-09-04 | Name : FreeBSD Ports: dovecot File : nvt/freebsd_dovecot0.nasl |
2008-03-19 | Name : Debian Security Advisory DSA 1516-1 (dovecot) File : nvt/deb_1516_1.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-04-02 | Name: The remote Debian host is missing a security update. File: debian_DLA-1333.nasl - Type: ACT_GATHER_INFO |
2018-03-20 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1057.nasl - Type: ACT_GATHER_INFO |
2018-03-20 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1056.nasl - Type: ACT_GATHER_INFO |
2018-03-05 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4130.nasl - Type: ACT_GATHER_INFO |
2018-01-29 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_92b8b284a3a241b1956cf9cf8b74f500.nasl - Type: ACT_GATHER_INFO |
2017-07-17 | Name: The remote Fedora host is missing a security update. File: fedora_2017-e8b639c286.nasl - Type: ACT_GATHER_INFO |
2017-07-07 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-787.nasl - Type: ACT_GATHER_INFO |
2017-05-12 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-1250-1.nasl - Type: ACT_GATHER_INFO |
2017-05-01 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_a8c8001b216c11e780aa005056925db4.nasl - Type: ACT_GATHER_INFO |
2017-04-28 | Name: The remote Fedora host is missing a security update. File: fedora_2017-da4ed58fd5.nasl - Type: ACT_GATHER_INFO |
2017-04-27 | Name: The remote Fedora host is missing a security update. File: fedora_2017-6ef28e38d6.nasl - Type: ACT_GATHER_INFO |
2017-04-12 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3828.nasl - Type: ACT_GATHER_INFO |
2017-04-12 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-3258-2.nasl - Type: ACT_GATHER_INFO |
2017-04-11 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-3258-1.nasl - Type: ACT_GATHER_INFO |
2017-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2016-daf90926d4.nasl - Type: ACT_GATHER_INFO |
2016-12-22 | Name: The remote Fedora host is missing a security update. File: fedora_2016-bb22a24d3d.nasl - Type: ACT_GATHER_INFO |
2015-05-20 | Name: The remote Fedora host is missing a security update. File: fedora_2015-7159.nasl - Type: ACT_GATHER_INFO |
2015-05-20 | Name: The remote Fedora host is missing a security update. File: fedora_2015-7089.nasl - Type: ACT_GATHER_INFO |
2015-05-04 | Name: The remote Fedora host is missing a security update. File: fedora_2015-7156.nasl - Type: ACT_GATHER_INFO |
2012-08-01 | Name: The remote Scientific Linux host is missing a security update. File: sl_20080521_dovecot_on_SL5_x.nasl - Type: ACT_GATHER_INFO |
2012-08-01 | Name: The remote Scientific Linux host is missing a security update. File: sl_20090120_dovecot_on_SL5_x.nasl - Type: ACT_GATHER_INFO |
2011-10-11 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201110-04.nasl - Type: ACT_GATHER_INFO |
2010-07-30 | Name: The remote Mandriva Linux host is missing one or more security updates. File: mandriva_MDVSA-2009-306.nasl - Type: ACT_GATHER_INFO |
2010-01-19 | Name: The remote openSUSE host is missing a security update. File: suse_11_2_dovecot12-100118.nasl - Type: ACT_GATHER_INFO |
2009-12-11 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_30211c45e52a11deb5cd00e0815b8da8.nasl - Type: ACT_GATHER_INFO |