Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 492494 (CVE-2013-6171) - <net-mail/dovecot-2.2.9 : checkpassword-reply Security Bypass (CVE-2013-6171)
Summary: <net-mail/dovecot-2.2.9 : checkpassword-reply Security Bypass (CVE-2013-6171)
Status: RESOLVED FIXED
Alias: CVE-2013-6171
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/54808/
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-11-25 11:37 UTC by Agostino Sarubbo
Modified: 2014-02-28 07:49 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-11-25 11:37:43 UTC
From ${URL} :

Description

A security issue has been reported in Dovecot, which can be exploited by malicious, local users to bypass 
certain security restrictions.

The security issue is caused due to the checkpassword-reply binary running with the UID and GID set to the 
user performing the authentication. This can be exploited to e.g. attach a debugger to a running instance 
of the checkpassword-reply binary and e.g. gain unauthorised access to another user's mailbox.

Successful exploitation requires the application to be configured to use the checkpassword authentication 
protocol.

The security issue is reported in versions prior to 2.2.7.


Solution:
Update to version 2.2.7.

Provided and/or discovered by:
cPanel Security Team.

Original Advisory:
Dovecot:
http://www.dovecot.org/list/dovecot-news/2013-November/000264.html

cPanel (Case 76869):
http://cpanel.net/tsr-2013-0010-full-disclosure/


@maintainer(s): since the fixed package is already in the tree, please let us know if it is ready for the stabilization or not.
Comment 1 Eray Aslan gentoo-dev 2013-11-26 10:07:29 UTC
dovecot-2.2.7 is not a good release.  I'd like to wait a bit and go for stabilising =net-mail/dovecot-2.2.9.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2013-12-12 14:57:17 UTC
CVE-2013-6171 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6171):
  checkpassword-reply in Dovecot before 2.2.7 performs setuid operations to a
  user who is authenticating, which allows local users to bypass
  authentication and access virtual email accounts by attaching to the process
  and using a restricted file descriptor to modify account information in the
  response to the dovecot-auth server.
Comment 3 Eray Aslan gentoo-dev 2014-01-04 04:46:33 UTC
Arches, please test and mark stable =net-mail/dovecot-2.2.9.  Thank you.
Comment 4 Yury German Gentoo Infrastructure gentoo-dev 2014-01-04 05:31:08 UTC
Eray 

Version 2.2.6 is still in STABLEREQ mode for alpha &
Comment 5 Agostino Sarubbo gentoo-dev 2014-01-04 13:07:18 UTC
amd64 stable
Comment 6 Agostino Sarubbo gentoo-dev 2014-01-04 13:08:10 UTC
x86 stable
Comment 7 Jeroen Roovers (RETIRED) gentoo-dev 2014-01-04 16:08:25 UTC
Stable for HPPA.
Comment 8 Agostino Sarubbo gentoo-dev 2014-01-05 08:59:15 UTC
ppc64 stable
Comment 9 Agostino Sarubbo gentoo-dev 2014-01-05 09:02:46 UTC
ppc stable
Comment 10 Agostino Sarubbo gentoo-dev 2014-01-05 09:04:27 UTC
sparc stable
Comment 11 Agostino Sarubbo gentoo-dev 2014-01-05 09:10:30 UTC
arm stable
Comment 12 Agostino Sarubbo gentoo-dev 2014-01-05 09:37:55 UTC
alpha stable
Comment 13 Agostino Sarubbo gentoo-dev 2014-01-12 13:18:18 UTC
ia64 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 14 Sergey Popov gentoo-dev 2014-02-27 14:03:26 UTC
Thanks for your work!

Vulnerable versions was hardmasked by Eray Aslan.

GLSA vote: no
Comment 15 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2014-02-28 07:49:20 UTC
GLSA vote: no.

Closing as [noglsa].