Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2008-1218 | First vendor Publication | 2008-03-10 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1218 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-255 | Credentials Management |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:17635 | |||
Oval ID: | oval:org.mitre.oval:def:17635 | ||
Title: | USN-593-1 -- dovecot vulnerabilities | ||
Description: | It was discovered that the default configuration of dovecot could allow access to any email files with group "mail" without verifying that a user had valid rights. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-593-1 CVE-2008-1199 CVE-2008-1218 | Version: | 7 |
Platform(s): | Ubuntu 6.06 Ubuntu 6.10 Ubuntu 7.04 Ubuntu 7.10 | Product(s): | dovecot |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18006 | |||
Oval ID: | oval:org.mitre.oval:def:18006 | ||
Title: | DSA-1516-1 dovecot - privilege escalation | ||
Description: | Prior to this update, the default configuration for Dovecot used by Debian runs the server daemons with group mail privileges. This means that users with write access to their mail directory on the server (for example, through an SSH login) could read and also delete via a symbolic link mailboxes owned by other users for which they do not have direct access (<a href="http://security-tracker.debian.org/tracker/CVE-2008-1199">CVE-2008-1199</a>). In addition, an internal interpretation conflict in password handling has been addressed proactively, even though it is not known to be exploitable (<a href="http://security-tracker.debian.org/tracker/CVE-2008-1218">CVE-2008-1218</a>). | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1516-1 CVE-2008-1199 CVE-2008-1218 | Version: | 7 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | dovecot |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:8054 | |||
Oval ID: | oval:org.mitre.oval:def:8054 | ||
Title: | DSA-1516 dovecot -- privilege escalation | ||
Description: | Prior to this update, the default configuration for Dovecot used by Debian runs the server daemons with group mail privileges. This means that users with write access to their mail directory on the server (for example, through an SSH login) could read and also delete via a symbolic link mailboxes owned by other users for which they do not have direct access (CVE-2008-1199). In addition, an internal interpretation conflict in password handling has been addressed proactively, even though it is not known to be exploitable (CVE-2008-1218). Note that applying this update requires manual action: The configuration setting mail_extra_groups = mail has been replaced with mail_privileged_group = mail. The update will show a configuration file conflict in /etc/dovecot/dovecot.conf. It is recommended that you keep the currently installed configuration file, and change the affected line. For your reference, the sample configuration (without your local changes) will have been written to /etc/dovecot/dovecot.conf.dpkg-new. If your current configuration uses mail_extra_groups with a value different from mail, you may have to resort to the mail_access_groups configuration directive. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1516 CVE-2008-1199 CVE-2008-1218 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | dovecot |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2008-03-14 | Dovecot IMAP 1.0.10 <= 1.1rc2 Remote Email Disclosure Exploit |
OpenVAS Exploits
Date | Description |
---|---|
2009-03-23 | Name : Ubuntu Update for dovecot vulnerabilities USN-593-1 File : nvt/gb_ubuntu_USN_593_1.nasl |
2009-02-16 | Name : Fedora Update for dovecot FEDORA-2008-2464 File : nvt/gb_fedora_2008_2464_dovecot_fc8.nasl |
2009-02-16 | Name : Fedora Update for dovecot FEDORA-2008-2475 File : nvt/gb_fedora_2008_2475_dovecot_fc7.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200803-25 (dovecot) File : nvt/glsa_200803_25.nasl |
2008-09-04 | Name : FreeBSD Ports: dovecot File : nvt/freebsd_dovecot0.nasl |
2008-03-19 | Name : Debian Security Advisory DSA 1516-1 (dovecot) File : nvt/deb_1516_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
42979 | Dovecot passdbs Argument Injection Authentication Bypass |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-10-01 | Name : The remote openSUSE host is missing a security update. File : suse_dovecot-5647.nasl - Type : ACT_GATHER_INFO |
2008-03-28 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-593-1.nasl - Type : ACT_GATHER_INFO |
2008-03-19 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200803-25.nasl - Type : ACT_GATHER_INFO |
2008-03-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1516.nasl - Type : ACT_GATHER_INFO |
2008-03-14 | Name : The remote mail server is affected by an authentication bypass vulnerability. File : dovecot_auth_bypass.nasl - Type : ACT_GATHER_INFO |
2008-03-13 | Name : The remote Fedora host is missing a security update. File : fedora_2008-2464.nasl - Type : ACT_GATHER_INFO |
2008-03-13 | Name : The remote Fedora host is missing a security update. File : fedora_2008-2475.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:14:51 |
|
2024-11-28 12:15:07 |
|
2021-05-05 01:04:35 |
|
2021-05-04 12:07:15 |
|
2021-04-22 01:07:40 |
|
2020-05-23 01:39:14 |
|
2020-05-23 00:21:24 |
|
2018-10-12 00:20:15 |
|
2018-10-04 00:19:32 |
|
2017-09-29 09:23:27 |
|
2017-08-08 09:23:55 |
|
2016-04-26 17:12:22 |
|
2014-02-17 10:44:10 |
|
2013-05-11 00:12:01 |
|