blob: a2e31366f5875b3f900e0e5fcdc947956c8388f5 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200804-24">
<title>DBmail: Data disclosure</title>
A vulnerability in DBMail could allow for passwordless login to any account
under certain configurations.
<product type="ebuild">dbmail</product>
<announced>April 18, 2008</announced>
<revised>April 18, 2008: 01</revised>
<package name="net-mail/dbmail" auto="yes" arch="*">
<unaffected range="ge">2.2.9</unaffected>
<vulnerable range="lt">2.2.9</vulnerable>
DBMail is a mail storage and retrieval daemon that uses SQL databases
as its data store. IMAP and POP3 can be used to retrieve mails from the
A vulnerability in DBMail's authldap module when used in conjunction
with an Active Directory server has been reported by vugluskr. When
passing a zero length password to the module, it tries to bind
anonymously to the LDAP server. If the LDAP server allows anonymous
binds, this bind succeeds and results in a successful authentication to
<impact type="low">
By passing an empty password string to the server, an attacker could be
able to log in to any account.
There is no known workaround at this time.
All DBMail users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-mail/dbmail-2.2.9&quot;</code>
<uri link="">CVE-2007-6714</uri>
<metadata tag="requester" timestamp="Fri, 18 Apr 2008 08:54:02 +0000">
<metadata tag="submitter" timestamp="Fri, 18 Apr 2008 09:20:04 +0000">
<metadata tag="bugReady" timestamp="Fri, 18 Apr 2008 14:01:09 +0000">