CVE-2008-1199 – dovecot: insecure mail_extra_groups option
https://notcve.org/view.php?id=CVE-2008-1199
Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack. Dovecot antes de 1.0.11, cuando se configura para utilizar mail_extra_groups para permitir a Dovecot crear dotlocks en /var/mail, podría permitir a usuarios locales leer archivos de mail sensibles para otros usuarios, o modificar archivos o directorios que sean escribibles por el grupo, a través de un ataque de enlaces simbólicos. • http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html http://secunia.com/advisories/29226 http://secunia.com/advisories/29385 http://secunia.com/advisories/29396 http://secunia.com/advisories/29557 http://secunia.com/advisories/30342 http://secunia.com/advisories/32151 http://security.gentoo.org/glsa/glsa-200803-25.xml http://www.debian.org/security/2008/dsa-1516 http://www.dovecot.org/list/dovecot-news/2008-March/000061.html http://www.redhat.com/ • CWE-16: Configuration CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2007-6598 – dovecot LDAP+auth cache user login mixup
https://notcve.org/view.php?id=CVE-2007-6598
Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password. Dovecot anterior a 1.0.10, con determinadas opciones de configuración incluyendo el uso de %variables, no mantiene adecuadamente la caché LDAP+auth, lo cual podría permitir a permite a usuarios autenticados remotamente identificarse como un usuario diferente que tiene la misma contraseña. • http://dovecot.org/list/dovecot-news/2007-December/000057.html http://dovecot.org/list/dovecot-news/2007-December/000058.html http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html http://osvdb.org/39876 http://secunia.com/advisories/28227 http://secunia.com/advisories/28271 http://secunia.com/advisories/28404 http://secunia.com/advisories/28434 http://secunia.com/advisories/30342 http://secunia.com/advisories/32151 http://www.debian.org/security/2008/dsa • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2007-4211 – Dovecot possible privilege ascalation in ACL plugin
https://notcve.org/view.php?id=CVE-2007-4211
The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command. La extensión ACL del Dovecot anterior a la 1.0.3 permite a usuarios remotos autenticados, con derechos de inserción, guardar ciertos indicadores a través de los comandos (1) COPY o (2) APPEND. • http://secunia.com/advisories/26320 http://secunia.com/advisories/26475 http://secunia.com/advisories/30342 http://www.dovecot.org/list/dovecot-news/2007-August/000048.html http://www.redhat.com/support/errata/RHSA-2008-0297.html http://www.securityfocus.com/bid/25182 https://exchange.xforce.ibmcloud.com/vulnerabilities/35767 https://issues.rpath.com/browse/RPL-1621 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11558 https://access.redhat.com •
CVE-2007-2231 – Directory traversal in dovecot with zlib plugin
https://notcve.org/view.php?id=CVE-2007-2231
Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name. Vulnerabilidad de escalado de directorio en index/mbox/mbox-storage.c de Dovecot versiones anteriores a 1.0.rc29, cuando se usa la extensión (plugin) zlib, permite a atacantes remotos leer buzones de correo (mbox files) comprimidos con gzip (.gz) de su elección mediante una secuencia .. (punto punto) en el nombre del buzón. • http://dovecot.org/doc/NEWS http://dovecot.org/list/dovecot-cvs/2007-March/008488.html http://dovecot.org/list/dovecot-news/2007-March/000038.html http://secunia.com/advisories/25072 http://secunia.com/advisories/30342 http://www.debian.org/security/2007/dsa-1359 http://www.novell.com/linux/security/advisories/2007_8_sr.html http://www.redhat.com/support/errata/RHSA-2008-0297.html http://www.securityfocus.com/archive/1/466168/100/0/threaded http://www.securityfo •
CVE-2006-5973
https://notcve.org/view.php?id=CVE-2006-5973
Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file. Desbordamiento de búfer (off-by-one) en Dovecot 1.0test53 hasta 1.0.rc14, y posiblemente otras versiones, cuando se utilizan los archivos de índice y mmap_disable tiene el valor "Sí", permite a usuarios IMAP o POP3 remotos autenticados provocar una denegación de servicio (caída) a través de vectores no especificados relacionados con el archivo de caché. • http://dovecot.org/list/dovecot-news/2006-November/000023.html http://dovecot.org/pipermail/dovecot-news/2006-November/000024.html http://secunia.com/advisories/23007 http://secunia.com/advisories/23150 http://secunia.com/advisories/23172 http://secunia.com/advisories/23213 http://securitytracker.com/id?1017288 http://www.novell.com/linux/security/advisories/2006_73_mono.html http://www.securityfocus.com/archive/1/452081/100/0/threaded http://www.securityfocus.com/bid/21183/inf •