Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.60568
Kategorie:Debian Local Security Checks
Titel:Debian Security Advisory DSA 1516-1 (dovecot)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing an update to dovecot
announced via advisory DSA 1516-1.

Prior to this update, the default configuration for Dovecot used by
Debian runs the server daemons with group mail privileges. This means
that users with write access to their mail directory by other means
(for example, through an SSH login) could read mailboxes owned by
other users for which they do not have direct write access
(CVE-2008-1199). In addition, an internal interpretation conflict in
password handling has been addressed proactively, even though it is
not known to be exploitable (CVE-2008-1218).

Note that applying this update requires manual action: The
configuration setting mail_extra_groups = mail has been replaced
with mail_privileged_group = mail. The update will show a
configuration file conflict in /etc/dovecot/dovecot.conf. It is
recommended that you keep the currently installed configuration file,
and change the affected line. For your reference, the sample
configuration (without your local changes) will have been written to
/etc/dovecot/dovecot.conf.dpkg-new.

If your current configuration uses mail_extra_groups with a value
different from mail, you may have to resort to the
mail_access_groups configuration directive.

For the stable distribution (etch), these problems have been fixed in
version 1.0.rc15-2etch4.

For the unstable distribution (sid), these problems have been fixed in
version 1.0.13-1.

For the old stable distribution (sarge), no updates are provided.
We recommend that you consider upgrading to the stable distribution.


Solution:
http://www.securityspace.com/smysecure/catid.html?in=DSA%201516-1

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-1199
BugTraq ID: 28092
http://www.securityfocus.com/bid/28092
Bugtraq: 20080304 Dovecot mail_extra_groups setting is often used insecurely (Google Search)
http://www.securityfocus.com/archive/1/489133/100/0/threaded
Debian Security Information: DSA-1516 (Google Search)
http://www.debian.org/security/2008/dsa-1516
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00358.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00381.html
http://security.gentoo.org/glsa/glsa-200803-25.xml
http://www.dovecot.org/list/dovecot-news/2008-March/000061.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10739
http://www.redhat.com/support/errata/RHSA-2008-0297.html
http://secunia.com/advisories/29226
http://secunia.com/advisories/29385
http://secunia.com/advisories/29396
http://secunia.com/advisories/29557
http://secunia.com/advisories/30342
http://secunia.com/advisories/32151
SuSE Security Announcement: SUSE-SR:2008:020 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
https://usn.ubuntu.com/593-1/
XForce ISS Database: dovecot-mailextragroups-unauth-access(41009)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41009
Common Vulnerability Exposure (CVE) ID: CVE-2008-1218
BugTraq ID: 28181
http://www.securityfocus.com/bid/28181
Bugtraq: 20080312 rPSA-2008-0108-1 dovecot (Google Search)
http://www.securityfocus.com/archive/1/489481/100/0/threaded
https://www.exploit-db.com/exploits/5257
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0108
http://www.dovecot.org/list/dovecot-news/2008-March/000064.html
http://www.dovecot.org/list/dovecot-news/2008-March/000065.html
http://secunia.com/advisories/29295
http://secunia.com/advisories/29364
XForce ISS Database: dovecot-tab-authentication-bypass(41085)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41085
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.