svn commit: r497014 - head/security/vuxml

Larry Rosenman ler at FreeBSD.org
Thu Mar 28 12:21:38 UTC 2019


Author: ler
Date: Thu Mar 28 12:21:36 2019
New Revision: 497014
URL: https://svnweb.freebsd.org/changeset/ports/497014

Log:
  vuxml: Document mail/dovecot buffer overflow.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Mar 28 11:41:08 2019	(r497013)
+++ head/security/vuxml/vuln.xml	Thu Mar 28 12:21:36 2019	(r497014)
@@ -58,6 +58,51 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="7862213c-5152-11e9-8b26-a4badb296695">
+    <topic>dovecot -- Buffer overflow reading extension header</topic>
+    <affects>
+      <package>
+	<name>dovecot</name>
+	<range><lt>2.3.5.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Aki Tuomi reports:</p>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-7524">
+	  <p>Vulnerability Details:
+When reading FTS or POP3-UIDL header from dovecot index, the input
+buffer size is not bound, and data is copied to target structure causing
+stack overflow.
+
+Risk:
+This can be used for local root privilege escalation or executing
+arbitrary code in dovecot process context. This requires ability to
+directly modify dovecot indexes.
+Steps to reproduce:
+Produce dovecot.index.log entry that creates an FTS header which has
+more than 12 bytes of data.
+Trigger dovecot indexer-worker or run doveadm index.
+Dovecot will crash.
+
+Mitigations:
+Since 2.3.0 dovecot has been compiled with stack smash protection, ASLR,
+read-only GOT tables and other techniques that make exploiting this bug
+much harder.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-7524</url>
+      <url>https://dovecot.org/list/dovecot-news/2019-March/000401.html</url>
+      <cvename>CVE-2019-7524</cvename>
+    </references>
+    <dates>
+      <discovery>2019-02-05</discovery>
+      <entry>2019-03-28</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="94d63fd7-508b-11e9-9ba0-4c72b94353b5">
     <topic>drupal -- Drupal core - Moderately critical - Cross Site Scripting</topic>
     <affects>


More information about the svn-ports-all mailing list