[Bug 252472] [vuxml] mail/dovecot: document vulerability in mail/dovecot lower than 2.3.13 (CVE-2020-24386)

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Wed Jan 6 14:26:02 UTC 2021


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=252472

            Bug ID: 252472
           Summary: [vuxml] mail/dovecot: document vulerability in
                    mail/dovecot lower than 2.3.13 (CVE-2020-24386)
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: ler at FreeBSD.org
          Reporter: thomas at bsdunix.ch
          Assignee: ler at FreeBSD.org
             Flags: maintainer-feedback?(ler at FreeBSD.org)

There was an vulnerability in mail/dovecot 2.3.12 and prior [1] 
There is a PR for 2.3.13
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=252415

It passes 'make validate' for me:
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
  <vuln vid="424db8a1-5027-11eb-a462-000e0c331e98">
    <topic>mail/dovecot -- vulnerability</topic>
    <affects>
      <package>
        <name>dovecot</name>
        <range><lt>2.3.13</lt></range>
      </package>
    </affects>
    <description>
      <body xmlns="http://www.w3.org/1999/xhtml">
        <p>Aki Tuomi reports:</p>
        <blockquote
cite="https://dovecot.org/pipermail/dovecot-news/2021-January/000450.html">
          <p>An issue was discovered in Dovecot before 2.3.13. By using IMAP
IDLE, an authenticated attacker can trigger unhibernation via
attacker-controlled parameters, leading to access to other users' email
messages (and path disclosure).</p>
        </blockquote>
      </body>
    </description>
    <references>
     
<url>https://dovecot.org/pipermail/dovecot-news/2021-January/000448.html</url>
      <cvename>CVE-2020-24386</cvename>
    </references>
    <dates>
      <discovery>2020-08-17</discovery>
      <entry>2021-01-06</entry>
    </dates>
  </vuln>



[1] Details about the vulnerability:
https://dovecot.org/pipermail/dovecot-news/2021-January/000450.html:

Open-Xchange Security Advisory 2021-01-04

Product: Dovecot
Vendor: OX Software GmbH
Internal reference: DOP-2009 (Bug ID)
Vulnerability type: CWE-150: Improper Neutralization of Escape, Meta, or
Control Sequences
Vulnerable version: 2.2.26-2.3.11.3
Vulnerable component: imap
Report confidence: Confirmed
Solution status: Fixed by Vendor
Fixed version: 2.3.13
Vendor notification: 2020-08-17
Solution date: 2020-08-27
Public disclosure: 2021-01-04
CVE reference: CVE-2020-24386
CVSS: 8.2 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N)

Vulnerability Details:

When imap hibernation is active, an attacker can cause Dovecot to
discover file
system directory structure and access other users' emails using
specially crafted
command. The attacker must have valid credentials to access the mail server.

Risk:

Attacker can access other users' emails and filesystem information.

Workaround:

Operators can choose to disable IMAP hibernation. IMAP hibernation is
not on by
default. To ensure imap hibernation is disabled, make sure
imap_hibernate_timeout
is set to 0 or unset.

Solution:

Operators should update to 2.3.13 or later version.

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list