You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa dovecot

Sigurnosni nedostatak programskog paketa dovecot

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3258-1
April 10, 2017

dovecot vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.10
– Ubuntu 16.04 LTS

Summary:

Dovecot could be made to crash if it received specially crafted input.

Software Description:
– dovecot: IMAP and POP3 email server

Details:

It was discovered that Dovecot incorrectly handled some usernames. An attacker
could possibly use this issue to cause Dovecot to hang or crash, resulting in a
denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
dovecot-core 1:2.2.24-1ubuntu1.2

Ubuntu 16.04 LTS:
dovecot-core 1:2.2.22-1ubuntu2.3

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3258-1
CVE-2017-2669

Package Information:
https://launchpad.net/ubuntu/+source/dovecot/1:2.2.24-1ubuntu1.2
https://launchpad.net/ubuntu/+source/dovecot/1:2.2.22-1ubuntu2.3

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=K272
—–END PGP SIGNATURE—–

 

==========================================================================
Ubuntu Security Notice USN-3258-2
April 11, 2017

dovecot regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.10
– Ubuntu 16.04 LTS

Summary:

USN-3258-1 introduced a regression in Dovecot.

Software Description:
– dovecot: IMAP and POP3 email server

Details:

USN-3258-1 intended to fix a vulnerability in Dovecot. Further investigation
revealed that only Dovecot versions 2.2.26 and newer were affected by the
vulnerability. Additionally, the change introduced a regression when Dovecot
was configured to use the “dict” authentication database. This update reverts
the change. We apologize for the inconvenience.

Original advisory details:

It was discovered that Dovecot incorrectly handled some usernames. An attacker
could possibly use this issue to cause Dovecot to hang or crash, resulting in a
denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
dovecot-core 1:2.2.24-1ubuntu1.3

Ubuntu 16.04 LTS:
dovecot-core 1:2.2.22-1ubuntu2.4

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3258-2
http://www.ubuntu.com/usn/usn-3258-1
CVE-2017-2669

Package Information:
https://launchpad.net/ubuntu/+source/dovecot/1:2.2.24-1ubuntu1.3
https://launchpad.net/ubuntu/+source/dovecot/1:2.2.22-1ubuntu2.4

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=sr4r
—–END PGP SIGNATURE—–

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-04-0037-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa QEMU

Otkriveni su sigurnosni nedostaci u programskom paketu QEMU za operacijski sustav Gentoo. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close