You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa dovecot

Sigurnosni nedostatak programskog paketa dovecot

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-3828-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
April 10, 2017 https://www.debian.org/security/faq
– ————————————————————————-

Package : dovecot
CVE ID : CVE-2017-2669
Debian Bug : 860049

It was discovered that the Dovecot email server is vulnerable to a
denial of service attack. When the “dict” passdb and userdb are used
for user authentication, the username sent by the IMAP/POP3 client is
sent through var_expand() to perform %variable expansion. Sending
specially crafted %variable fields could result in excessive memory
usage causing the process to crash (and restart).

For the stable distribution (jessie), this problem has been fixed in
version 1:2.2.13-12~deb8u2.

We recommend that you upgrade your dovecot packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAljr5IBfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0RvWQ//SF7KpuoR6O8twHEnckWkOlJkizr2gT1nz7W8W+DzY2CJp8DMs2Y0ekqW
fLtVmfBe9DrYhmBkKX7zfK0Wqx9hb/+QmoT8SXTcb3FueuywgZmAmZ2I7iXEcZ4d
e5lOm38tynEJ10gEShNhf2iafNWr6TsuG8cQg0BsCWB398kzJwA9YkyG2a1kmbUC
5tmoU9vpHrco/sgUkaVO3aNhGUmEtJFneJioiE2NWwow3m9n9OYY/fc/CbX/S/JD
pZXCgzOzKx1u0Xqft5jTDZNksILcuN3WND8xDd5p/67KLg0JzLkx63dfESBMfwTF
V3gIardQWpAoV/eHojz/16MKR4GUIFiLSmmexzZ/t9YYVLCqPc+jUlbJRk9yQ0uo
c1/B4tZ8kgqDeOgBTU+7xSeMFHPQ47S22EjBEhOR64wsPoquMWVuiPOLyGIRFZ18
gRmkg4DI2f8c2nVMEsj+Lrrwgrx5P+zFlzU+Doj5SaNSL0q7WmI4HQ+edxCn6TpH
RIARIZ8zRSQygoCKo585iQhbeAF7C13RIZBp8gvCcyix76pWlHA5KvLxMibYBEPU
BVoj8s4e7Q4P6G+2vX/b+q5leUxsRMUZA6K+ppGPSiNsNjTbAAlrhjo5VntZZZaQ
+nbe9EWchjG03fx/rNkV8IWVNiFTBzdvZrO5a76UvvjwwtTUjZA=
=zaQI
—–END PGP SIGNATURE—–

 

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-3828-2 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
April 11, 2017 https://www.debian.org/security/faq
– ————————————————————————-

Package : dovecot

The Dovecot update issued as DSA-3828-1 introduced a regression, this
update reverts the backported patch. Further analysis by the Dovecot
team has shown that only versions starting from 2.2.26 are affected. For
reference, the original advisory text follows.

It was discovered that the Dovecot email server is vulnerable to a
denial of service attack. When the “dict” passdb and userdb are used
for user authentication, the username sent by the IMAP/POP3 client is
sent through var_expand() to perform %variable expansion. Sending
specially crafted %variable fields could result in excessive memory
usage causing the process to crash (and restart).

For the stable distribution (jessie), this problem has been fixed in
version 1:2.2.13-12~deb8u3.

We recommend that you upgrade your dovecot packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
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=Z+en
—–END PGP SIGNATURE—–

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-04-0038-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa dovecot

Otkriven je sigurnosni nedostatak u programskom paketu dovecot za operacijski sustav Ubuntu 16.04 LTS i 16.10. Otkriveni nedostatak potencijalnim napadačima...

Close