blob: 9d34a4cc1d7e05e0c5009c70761ce731fa31c2a5 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200812-16">
<title>Dovecot: Multiple vulnerabilities</title>
Multiple vulnerabilities were found in the Dovecot mailserver.
<product type="ebuild">dovecot</product>
<announced>December 14, 2008</announced>
<revised>December 14, 2008: 01</revised>
<package name="net-mail/dovecot" auto="yes" arch="*">
<unaffected range="ge">1.1.7-r1</unaffected>
<vulnerable range="lt">1.1.7-r1</vulnerable>
Dovecot is an IMAP and POP3 server written with security primarily in
Several vulnerabilities were found in Dovecot:
<li>The "k"
right in the acl_plugin does not work as expected (CVE-2008-4577,
<li>The dovecot.conf is world-readable, providing
improper protection for the ssl_key_password setting
<li>A permanent Denial of Service with broken mail
headers is possible (CVE-2008-4907)</li>
<impact type="normal">
These vulnerabilities might allow a remote attacker to cause a Denial
of Service, to circumvent security restrictions or allow local
attackers to disclose the passphrase of the SSL private key.
There is no known workaround at this time.
All Dovecot users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-mail/dovecot-1.1.7-r1&quot;</code>
Users should be aware that dovecot.conf will still be world-readable
after the update. If employing ssl_key_password, it should not be used
in dovecot.conf but in a separate file which should be included with
<uri link="">CVE-2008-4577</uri>
<uri link="">CVE-2008-4578</uri>
<uri link="">CVE-2008-4870</uri>
<uri link="">CVE-2008-4907</uri>
<metadata tag="submitter" timestamp="Sat, 29 Nov 2008 10:07:16 +0000">
<metadata tag="bugReady" timestamp="Sat, 06 Dec 2008 18:05:53 +0000">