Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 368653 - <net-mail/dovecot-{1.2.17,2.0.13}: Multiple Vulnerabilities (CVE-2010-{3304,3706,3707,3779,3780},CVE-2011-{1929,2166,2167})
Summary: <net-mail/dovecot-{1.2.17,2.0.13}: Multiple Vulnerabilities (CVE-2010-{3304,3...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2011-05-25 06:25 UTC by Benedikt Böhm (RETIRED)
Modified: 2011-10-10 20:25 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Benedikt Böhm (RETIRED) gentoo-dev 2011-05-25 06:25:32 UTC
CVE-2011-1929: lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.

CVE-2011-2166: script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
Comment 1 Tim Sammut (RETIRED) gentoo-dev 2011-05-25 15:21:12 UTC
@net-mail and Eray, looks like both 1.2.17 and 2.0.13 are fixed and in the tree. Can we move forward with stabilization of one of those versions? Thanks!
Comment 2 Eray Aslan gentoo-dev 2011-05-25 19:02:26 UTC
We should stabilize both net-mail/dovecot-1.2.17 and net-mail/dovecot-2.0.13.  There are still some users who prefer to stick with dovecot-1.2 branch.
Comment 3 Tim Sammut (RETIRED) gentoo-dev 2011-05-25 19:05:19 UTC
(In reply to comment #2)
> We should stabilize both net-mail/dovecot-1.2.17 and net-mail/dovecot-2.0.13. 
> There are still some users who prefer to stick with dovecot-1.2 branch.

Sounds good, thank you.

Arches, please test and mark stable:
=net-mail/dovecot-2.0.13
Target keywords : "alpha amd64 arm ppc sparc x86"

=net-mail/dovecot-1.2.17
Target keywords : "alpha amd64 arm ppc sparc x86"
Comment 4 Agostino Sarubbo gentoo-dev 2011-05-25 19:21:13 UTC
both work on amd64
Comment 5 Paweł Hajdan, Jr. (RETIRED) gentoo-dev 2011-05-26 11:38:17 UTC
x86 stable
Comment 6 Kacper Kowalik (Xarthisius) (RETIRED) gentoo-dev 2011-05-27 06:53:19 UTC
ppc stable
Comment 7 Markos Chandras (RETIRED) gentoo-dev 2011-05-27 10:02:46 UTC
amd64 done. Thanks Agostino
Comment 8 Raúl Porcel (RETIRED) gentoo-dev 2011-05-28 17:01:15 UTC
alpha/arm/sparc stable
Comment 9 Tim Sammut (RETIRED) gentoo-dev 2011-05-28 17:14:07 UTC
Thanks, everyone. GLSA Vote: yes.
Comment 10 GLSAMaker/CVETool Bot gentoo-dev 2011-06-13 16:57:05 UTC
CVE-2011-2167 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2167):
  script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot
  configuration setting, which might allow remote authenticated users to
  conduct directory traversal attacks by leveraging a script.

CVE-2011-2166 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2166):
  script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and
  group configuration settings, which might allow remote authenticated users
  to bypass intended access restrictions by leveraging a script.

CVE-2011-1929 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1929):
  lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x
  before 2.0.13 does not properly handle '\0' characters in header names,
  which allows remote attackers to cause a denial of service (daemon crash or
  mailbox corruption) via a crafted e-mail message.
Comment 11 GLSAMaker/CVETool Bot gentoo-dev 2011-06-25 12:27:41 UTC
CVE-2010-3304 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3304):
  The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly
  created mailboxes in certain configurations, which might allow remote
  attackers to read mailboxes that have unintended weak ACLs.
Comment 12 GLSAMaker/CVETool Bot gentoo-dev 2011-06-25 12:28:13 UTC
CVE-2010-3779 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3779):
  Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin
  permission to the owner of each mailbox in a non-public namespace, which
  might allow remote authenticated users to bypass intended access
  restrictions by changing the ACL of a mailbox, as demonstrated by a
  symlinked shared mailbox.

CVE-2010-3707 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3707):
  plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x
  before 2.0.5 interprets an ACL entry as a directive to add to the
  permissions granted by another ACL entry, instead of a directive to replace
  the permissions granted by another ACL entry, in certain circumstances
  involving more specific entries that occur after less specific entries,
  which allows remote authenticated users to bypass intended access
  restrictions via a request to read or modify a mailbox.

CVE-2010-3706 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3706):
  plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x
  before 2.0.5 interprets an ACL entry as a directive to add to the
  permissions granted by another ACL entry, instead of a directive to replace
  the permissions granted by another ACL entry, in certain circumstances
  involving the private namespace of a user, which allows remote authenticated
  users to bypass intended access restrictions via a request to read or modify
  a mailbox.
Comment 13 GLSAMaker/CVETool Bot gentoo-dev 2011-10-07 22:24:46 UTC
CVE-2010-3780 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3780):
  Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a
  denial of service (master process outage) by simultaneously disconnecting
  many (1) IMAP or (2) POP3 sessions.
Comment 14 Stefan Behte (RETIRED) gentoo-dev Security 2011-10-08 21:46:10 UTC
Vote: YES. Added to pending GLSA request.
Comment 15 GLSAMaker/CVETool Bot gentoo-dev 2011-10-10 20:25:26 UTC
This issue was resolved and addressed in
 GLSA 201110-04 at http://security.gentoo.org/glsa/glsa-201110-04.xml
by GLSA coordinator Stefan Behte (craig).