ID

VAR-201105-0095


CVE

CVE-2011-1929


TITLE

Dovecot of lib-mail/message-header-parser.c Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2011-001934

DESCRIPTION

lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message. Dovecot is an open source IMAP and POP3 server for Linux/UNIX-like systems. Dovecot is prone to a denial-of-service vulnerability because it fails to properly parse message headers. A remote attacker can exploit this issue to crash the affected application, denying service to legitimate users. Dovecot versions prior to 1.2.17 and 2.0.13 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: dovecot security update Advisory ID: RHSA-2011:1187-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1187.html Issue date: 2011-08-18 CVE Names: CVE-2011-1929 ===================================================================== 1. Summary: Updated dovecot packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. (CVE-2011-1929) Users of dovecot are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing the updated packages, the dovecot service will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 706286 - CVE-2011-1929 dovecot: potential crash when parsing header names that contain NUL characters 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/dovecot-0.99.11-10.EL4.src.rpm i386: dovecot-0.99.11-10.EL4.i386.rpm dovecot-debuginfo-0.99.11-10.EL4.i386.rpm ia64: dovecot-0.99.11-10.EL4.ia64.rpm dovecot-debuginfo-0.99.11-10.EL4.ia64.rpm ppc: dovecot-0.99.11-10.EL4.ppc.rpm dovecot-debuginfo-0.99.11-10.EL4.ppc.rpm s390: dovecot-0.99.11-10.EL4.s390.rpm dovecot-debuginfo-0.99.11-10.EL4.s390.rpm s390x: dovecot-0.99.11-10.EL4.s390x.rpm dovecot-debuginfo-0.99.11-10.EL4.s390x.rpm x86_64: dovecot-0.99.11-10.EL4.x86_64.rpm dovecot-debuginfo-0.99.11-10.EL4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/dovecot-0.99.11-10.EL4.src.rpm i386: dovecot-0.99.11-10.EL4.i386.rpm dovecot-debuginfo-0.99.11-10.EL4.i386.rpm x86_64: dovecot-0.99.11-10.EL4.x86_64.rpm dovecot-debuginfo-0.99.11-10.EL4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/dovecot-0.99.11-10.EL4.src.rpm i386: dovecot-0.99.11-10.EL4.i386.rpm dovecot-debuginfo-0.99.11-10.EL4.i386.rpm ia64: dovecot-0.99.11-10.EL4.ia64.rpm dovecot-debuginfo-0.99.11-10.EL4.ia64.rpm x86_64: dovecot-0.99.11-10.EL4.x86_64.rpm dovecot-debuginfo-0.99.11-10.EL4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/dovecot-0.99.11-10.EL4.src.rpm i386: dovecot-0.99.11-10.EL4.i386.rpm dovecot-debuginfo-0.99.11-10.EL4.i386.rpm ia64: dovecot-0.99.11-10.EL4.ia64.rpm dovecot-debuginfo-0.99.11-10.EL4.ia64.rpm x86_64: dovecot-0.99.11-10.EL4.x86_64.rpm dovecot-debuginfo-0.99.11-10.EL4.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/dovecot-1.0.7-7.el5_7.1.src.rpm i386: dovecot-1.0.7-7.el5_7.1.i386.rpm dovecot-debuginfo-1.0.7-7.el5_7.1.i386.rpm x86_64: dovecot-1.0.7-7.el5_7.1.x86_64.rpm dovecot-debuginfo-1.0.7-7.el5_7.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/dovecot-1.0.7-7.el5_7.1.src.rpm i386: dovecot-1.0.7-7.el5_7.1.i386.rpm dovecot-debuginfo-1.0.7-7.el5_7.1.i386.rpm ia64: dovecot-1.0.7-7.el5_7.1.ia64.rpm dovecot-debuginfo-1.0.7-7.el5_7.1.ia64.rpm ppc: dovecot-1.0.7-7.el5_7.1.ppc.rpm dovecot-debuginfo-1.0.7-7.el5_7.1.ppc.rpm s390x: dovecot-1.0.7-7.el5_7.1.s390x.rpm dovecot-debuginfo-1.0.7-7.el5_7.1.s390x.rpm x86_64: dovecot-1.0.7-7.el5_7.1.x86_64.rpm dovecot-debuginfo-1.0.7-7.el5_7.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dovecot-2.0.9-2.el6_1.1.src.rpm i386: dovecot-2.0.9-2.el6_1.1.i686.rpm dovecot-debuginfo-2.0.9-2.el6_1.1.i686.rpm dovecot-mysql-2.0.9-2.el6_1.1.i686.rpm dovecot-pgsql-2.0.9-2.el6_1.1.i686.rpm dovecot-pigeonhole-2.0.9-2.el6_1.1.i686.rpm ppc64: dovecot-2.0.9-2.el6_1.1.ppc.rpm dovecot-2.0.9-2.el6_1.1.ppc64.rpm dovecot-debuginfo-2.0.9-2.el6_1.1.ppc.rpm dovecot-debuginfo-2.0.9-2.el6_1.1.ppc64.rpm dovecot-mysql-2.0.9-2.el6_1.1.ppc64.rpm dovecot-pgsql-2.0.9-2.el6_1.1.ppc64.rpm dovecot-pigeonhole-2.0.9-2.el6_1.1.ppc64.rpm s390x: dovecot-2.0.9-2.el6_1.1.s390.rpm dovecot-2.0.9-2.el6_1.1.s390x.rpm dovecot-debuginfo-2.0.9-2.el6_1.1.s390.rpm dovecot-debuginfo-2.0.9-2.el6_1.1.s390x.rpm dovecot-mysql-2.0.9-2.el6_1.1.s390x.rpm dovecot-pgsql-2.0.9-2.el6_1.1.s390x.rpm dovecot-pigeonhole-2.0.9-2.el6_1.1.s390x.rpm x86_64: dovecot-2.0.9-2.el6_1.1.i686.rpm dovecot-2.0.9-2.el6_1.1.x86_64.rpm dovecot-debuginfo-2.0.9-2.el6_1.1.i686.rpm dovecot-debuginfo-2.0.9-2.el6_1.1.x86_64.rpm dovecot-mysql-2.0.9-2.el6_1.1.x86_64.rpm dovecot-pgsql-2.0.9-2.el6_1.1.x86_64.rpm dovecot-pigeonhole-2.0.9-2.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dovecot-2.0.9-2.el6_1.1.src.rpm i386: dovecot-debuginfo-2.0.9-2.el6_1.1.i686.rpm dovecot-devel-2.0.9-2.el6_1.1.i686.rpm ppc64: dovecot-debuginfo-2.0.9-2.el6_1.1.ppc64.rpm dovecot-devel-2.0.9-2.el6_1.1.ppc64.rpm s390x: dovecot-debuginfo-2.0.9-2.el6_1.1.s390x.rpm dovecot-devel-2.0.9-2.el6_1.1.s390x.rpm x86_64: dovecot-debuginfo-2.0.9-2.el6_1.1.x86_64.rpm dovecot-devel-2.0.9-2.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dovecot-2.0.9-2.el6_1.1.src.rpm i386: dovecot-2.0.9-2.el6_1.1.i686.rpm dovecot-debuginfo-2.0.9-2.el6_1.1.i686.rpm dovecot-mysql-2.0.9-2.el6_1.1.i686.rpm dovecot-pgsql-2.0.9-2.el6_1.1.i686.rpm dovecot-pigeonhole-2.0.9-2.el6_1.1.i686.rpm x86_64: dovecot-2.0.9-2.el6_1.1.i686.rpm dovecot-2.0.9-2.el6_1.1.x86_64.rpm dovecot-debuginfo-2.0.9-2.el6_1.1.i686.rpm dovecot-debuginfo-2.0.9-2.el6_1.1.x86_64.rpm dovecot-mysql-2.0.9-2.el6_1.1.x86_64.rpm dovecot-pgsql-2.0.9-2.el6_1.1.x86_64.rpm dovecot-pigeonhole-2.0.9-2.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dovecot-2.0.9-2.el6_1.1.src.rpm i386: dovecot-debuginfo-2.0.9-2.el6_1.1.i686.rpm dovecot-devel-2.0.9-2.el6_1.1.i686.rpm x86_64: dovecot-debuginfo-2.0.9-2.el6_1.1.x86_64.rpm dovecot-devel-2.0.9-2.el6_1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1929.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOTW29XlSAg2UNWIIRAr8LAKCu85vT3BXBKZ1SRebWK7B9nG6OFQCfYR3k P3AdaDf2BpXnEhk2OL5DTpo= =eG31 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201110-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Dovecot: Multiple vulnerabilities Date: October 10, 2011 Bugs: #286844, #293954, #314533, #368653 ID: 201110-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities were found in Dovecot, the worst of which allowing for remote execution of arbitrary code. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-mail/dovecot < 2.0.13 *>= 1.2.17 >= 2.0.13 Description =========== Multiple vulnerabilities have been discovered in Dovecot. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could exploit these vulnerabilities to cause the remote execution of arbitrary code, or a Denial of Service condition, to conduct directory traversal attacks, corrupt data, or disclose information. Workaround ========== There is no known workaround at this time. Resolution ========== All Dovecot 1 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-mail/dovecot-1.2.17" All Dovecot 2 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-mail/dovecot-2.0.13" NOTE: This is a legacy GLSA. Updates for all affected architectures are available since May 28, 2011. It is likely that your system is already no longer affected by this issue. References ========== [ 1 ] CVE-2009-3235 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3235 [ 2 ] CVE-2009-3897 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3897 [ 3 ] CVE-2010-0745 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0745 [ 4 ] CVE-2010-3304 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3304 [ 5 ] CVE-2010-3706 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3706 [ 6 ] CVE-2010-3707 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3707 [ 7 ] CVE-2010-3779 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3779 [ 8 ] CVE-2010-3780 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3780 [ 9 ] CVE-2011-1929 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1929 [ 10 ] CVE-2011-2166 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2166 [ 11 ] CVE-2011-2167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2167 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201110-04.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . Packages for 2009.0 are provided as of the Extended Maintenance Program. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFN3e9VmqjQ0CJFipgRAjwfAJ95TzNOzqcOHVs9I3gIj1PqbuH6+gCfaxLM TC22GorN3moiTA4Ska8YOLU= =2Q1M -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ========================================================================== Ubuntu Security Notice USN-1143-1 June 02, 2011 dovecot vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.04 - Ubuntu 10.10 - Ubuntu 10.04 LTS Summary: An attacker could send a crafted email message that could disrupt email service. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 11.04: dovecot-common 1:1.2.15-3ubuntu2.1 Ubuntu 10.10: dovecot-common 1:1.2.12-1ubuntu8.2 Ubuntu 10.04 LTS: dovecot-common 1:1.2.9-1ubuntu6.4 In general, a standard system update will make all the necessary changes. The oldstable distribution (lenny) is not affected. For the stable distribution (squeeze), this problem has been fixed in version 1.2.15-7. For the unstable distribution (sid), this problem has been fixed in version 2.0.13-1

Trust: 2.88

sources: NVD: CVE-2011-1929 // JVNDB: JVNDB-2011-001934 // CNVD: CNVD-2011-2132 // BID: 47930 // PACKETSTORM: 104202 // PACKETSTORM: 105652 // PACKETSTORM: 101719 // PACKETSTORM: 101933 // PACKETSTORM: 101949

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2011-2132

AFFECTED PRODUCTS

vendor:dovecotmodel:dovecotscope:eqversion:2.0.12

Trust: 1.9

vendor:dovecotmodel:dovecotscope:eqversion:2.0.1

Trust: 1.9

vendor:dovecotmodel:dovecotscope:eqversion:2.0.0

Trust: 1.9

vendor:dovecotmodel:dovecotscope:eqversion:2.0.8

Trust: 1.6

vendor:dovecotmodel:dovecotscope:eqversion:2.0.7

Trust: 1.6

vendor:dovecotmodel:dovecotscope:eqversion:2.0

Trust: 1.6

vendor:dovecotmodel:dovecotscope:eqversion:2.0.9

Trust: 1.6

vendor:dovecotmodel:dovecotscope:eqversion:2.0.6

Trust: 1.6

vendor:dovecotmodel:dovecotscope:eqversion:2.0.10

Trust: 1.6

vendor:dovecotmodel:dovecotscope:eqversion:2.0.11

Trust: 1.6

vendor:dovecotmodel:dovecotscope:eqversion:2.0.4

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:2.0.3

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:2.0.2

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.16

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.15

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.14

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.13

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.12

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.10

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.9

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.8

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.7

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:2.0.5

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.6

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.5

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.4

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.3

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.2

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.11

Trust: 1.3

vendor:dovecotmodel:dovecotscope:eqversion:1.2.0

Trust: 1.0

vendor:dovecotmodel:dovecotscope:eqversion:1.2.1

Trust: 1.0

vendor:timo sirainenmodel:dovecotscope:ltversion:1.2.17

Trust: 0.8

vendor:timo sirainenmodel:dovecotscope:ltversion:2.0.13

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0 (x64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11 (x64)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux server eusscope:eqversion:6.1.z

Trust: 0.8

vendor:red hatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:dovecotmodel:dovecotscope:eqversion:1.2.x

Trust: 0.6

vendor:dovecotmodel:dovecotscope:eqversion:2.0.x

Trust: 0.6

vendor:ubuntumodel:linux powerpcscope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.10

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.10

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.3

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:dovecotmodel:dovecotscope:neversion:2.0.13

Trust: 0.3

vendor:dovecotmodel:dovecotscope:neversion:1.2.17

Trust: 0.3

sources: CNVD: CNVD-2011-2132 // BID: 47930 // JVNDB: JVNDB-2011-001934 // CNNVD: CNNVD-201105-250 // NVD: CVE-2011-1929

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-1929
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-1929
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201105-250
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2011-1929
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2011-001934 // CNNVD: CNNVD-201105-250 // NVD: CVE-2011-1929

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2011-001934 // NVD: CVE-2011-1929

THREAT TYPE

remote

Trust: 0.9

sources: PACKETSTORM: 105652 // PACKETSTORM: 101719 // PACKETSTORM: 101933 // CNNVD: CNNVD-201105-250

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201105-250

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-001934

PATCH

title:v1.2.17 releasedurl:http://dovecot.org/pipermail/dovecot/2011-May/059086.html

Trust: 0.8

title:v2.0.13 releasedurl:http://dovecot.org/pipermail/dovecot/2011-May/059085.html

Trust: 0.8

title:dovecot-1.1 / changeseturl:http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c

Trust: 0.8

title:RHSA-2011:1187url:https://rhn.redhat.com/errata/RHSA-2011-1187.html

Trust: 0.8

title:TLSA-2011-22url:http://www.turbolinux.co.jp/security/2011/TLSA-2011-22j.txt

Trust: 0.8

title:Dovecot denies service patch vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/4012

Trust: 0.6

sources: CNVD: CNVD-2011-2132 // JVNDB: JVNDB-2011-001934

EXTERNAL IDS

db:NVDid:CVE-2011-1929

Trust: 3.8

db:BIDid:47930

Trust: 3.3

db:OSVDBid:72495

Trust: 1.8

db:SECUNIAid:44683

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2011/05/19/6

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2011/05/19/3

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2011/05/18/4

Trust: 1.6

db:SECUNIAid:44827

Trust: 1.0

db:SECUNIAid:44771

Trust: 1.0

db:SECUNIAid:44712

Trust: 1.0

db:SECUNIAid:44756

Trust: 1.0

db:JVNDBid:JVNDB-2011-001934

Trust: 0.8

db:CNVDid:CNVD-2011-2132

Trust: 0.6

db:MLISTid:[DOVECOT] 20110511 V2.0.13 RELEASED

Trust: 0.6

db:MLISTid:[DOVECOT] 20110511 V1.2.17 RELEASED

Trust: 0.6

db:MLISTid:[OSS-SECURITY] 20110519 RE: DOVECOT RELEASES

Trust: 0.6

db:MLISTid:[OSS-SECURITY] 20110518 DOVECOT RELEASES

Trust: 0.6

db:CNNVDid:CNNVD-201105-250

Trust: 0.6

db:PACKETSTORMid:104202

Trust: 0.1

db:PACKETSTORMid:105652

Trust: 0.1

db:PACKETSTORMid:101719

Trust: 0.1

db:PACKETSTORMid:101933

Trust: 0.1

db:PACKETSTORMid:101949

Trust: 0.1

sources: CNVD: CNVD-2011-2132 // BID: 47930 // JVNDB: JVNDB-2011-001934 // PACKETSTORM: 104202 // PACKETSTORM: 105652 // PACKETSTORM: 101719 // PACKETSTORM: 101933 // PACKETSTORM: 101949 // CNNVD: CNNVD-201105-250 // NVD: CVE-2011-1929

REFERENCES

url:http://www.securityfocus.com/bid/47930

Trust: 3.0

url:http://dovecot.org/pipermail/dovecot/2011-may/059086.html

Trust: 1.9

url:http://dovecot.org/pipermail/dovecot/2011-may/059085.html

Trust: 1.9

url:http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c

Trust: 1.9

url:http://osvdb.org/72495

Trust: 1.8

url:http://secunia.com/advisories/44683

Trust: 1.8

url:https://bugzilla.redhat.com/show_bug.cgi?id=706286

Trust: 1.6

url:http://www.dovecot.org/doc/news-2.0

Trust: 1.6

url:http://www.dovecot.org/doc/news-1.2

Trust: 1.6

url:http://openwall.com/lists/oss-security/2011/05/19/6

Trust: 1.6

url:http://openwall.com/lists/oss-security/2011/05/19/3

Trust: 1.6

url:http://openwall.com/lists/oss-security/2011/05/18/4

Trust: 1.6

url:http://www.debian.org/security/2011/dsa-2252

Trust: 1.0

url:http://secunia.com/advisories/44756

Trust: 1.0

url:https://hermes.opensuse.org/messages/8581790

Trust: 1.0

url:http://lists.fedoraproject.org/pipermail/package-announce/2011-may/060825.html

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2011-1187.html

Trust: 1.0

url:http://lists.fedoraproject.org/pipermail/package-announce/2011-may/060815.html

Trust: 1.0

url:http://lists.fedoraproject.org/pipermail/package-announce/2011-june/061384.html

Trust: 1.0

url:http://secunia.com/advisories/44827

Trust: 1.0

url:http://secunia.com/advisories/44771

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdvsa-2011:101

Trust: 1.0

url:http://secunia.com/advisories/44712

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/67589

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-1143-1

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1929

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1929

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2011-1929

Trust: 0.4

url:http://www.dovecot.org/

Trust: 0.3

url:http://secunia.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2011-1187.html

Trust: 0.1

url:https://access.redhat.com/kb/docs/doc-11259

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:http://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-1929.html

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1929

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3304

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3706

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0745

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3897

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3779

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2167

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3707

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3897

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3780

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2166

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3235

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201110-04.xml

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3235

Trust: 0.1

url:http://store.mandriva.com/product_info.php\?cpath=149\&amp;products_id=490

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dovecot/1:1.2.15-3ubuntu2.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dovecot/1:1.2.12-1ubuntu8.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dovecot/1:1.2.9-1ubuntu6.4

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

sources: CNVD: CNVD-2011-2132 // BID: 47930 // JVNDB: JVNDB-2011-001934 // PACKETSTORM: 104202 // PACKETSTORM: 105652 // PACKETSTORM: 101719 // PACKETSTORM: 101933 // PACKETSTORM: 101949 // CNNVD: CNNVD-201105-250 // NVD: CVE-2011-1929

CREDITS

Timo Sirainen

Trust: 0.3

sources: BID: 47930

SOURCES

db:CNVDid:CNVD-2011-2132
db:BIDid:47930
db:JVNDBid:JVNDB-2011-001934
db:PACKETSTORMid:104202
db:PACKETSTORMid:105652
db:PACKETSTORMid:101719
db:PACKETSTORMid:101933
db:PACKETSTORMid:101949
db:CNNVDid:CNNVD-201105-250
db:NVDid:CVE-2011-1929

LAST UPDATE DATE

2024-12-20T22:11:06.722000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-2132date:2011-06-05T00:00:00
db:BIDid:47930date:2015-04-13T21:58:00
db:JVNDBid:JVNDB-2011-001934date:2011-08-31T00:00:00
db:CNNVDid:CNNVD-201105-250date:2011-05-25T00:00:00
db:NVDid:CVE-2011-1929date:2024-11-21T01:27:19.797

SOURCES RELEASE DATE

db:CNVDid:CNVD-2011-2132date:2011-06-05T00:00:00
db:BIDid:47930date:2011-05-19T00:00:00
db:JVNDBid:JVNDB-2011-001934date:2011-07-26T00:00:00
db:PACKETSTORMid:104202date:2011-08-19T01:53:33
db:PACKETSTORMid:105652date:2011-10-10T22:42:12
db:PACKETSTORMid:101719date:2011-05-26T13:48:10
db:PACKETSTORMid:101933date:2011-06-02T06:03:22
db:PACKETSTORMid:101949date:2010-06-02T12:13:00
db:CNNVDid:CNNVD-201105-250date:2011-05-25T00:00:00
db:NVDid:CVE-2011-1929date:2011-05-24T23:55:04.387