Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.68925
Kategorie:Ubuntu Local Security Checks
Titel:Ubuntu USN-1059-1 (dovecot)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing an update to dovecot
announced via advisory USN-1059-1.

Details follow:

It was discovered that the ACL plugin in Dovecot would incorrectly
propagate ACLs to new mailboxes. A remote authenticated user could possibly
read new mailboxes that were created with the wrong ACL. (CVE-2010-3304)

It was discovered that the ACL plugin in Dovecot would incorrectly merge
ACLs in certain circumstances. A remote authenticated user could possibly
bypass intended access restrictions and gain access to mailboxes.
(CVE-2010-3706, CVE-2010-3707)

It was discovered that the ACL plugin in Dovecot would incorrectly grant
the admin permission to owners of certain mailboxes. A remote authenticated
user could possibly bypass intended access restrictions and gain access to
mailboxes. (CVE-2010-3779)

It was discovered that Dovecot incorrecly handled the simultaneous
disconnect of a large number of sessions. A remote authenticated user could
use this flaw to cause Dovecot to crash, resulting in a denial of service.
(CVE-2010-3780)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 10.04 LTS:
dovecot-common 1:1.2.9-1ubuntu6.3

Ubuntu 10.10:
dovecot-common 1:1.2.12-1ubuntu8.1

In general, a standard system update will make all the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-1059-1

Risk factor : High

CVSS Score:
6.4

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-3304
BugTraq ID: 41964
http://www.securityfocus.com/bid/41964
http://www.mandriva.com/security/advisories?name=MDVSA-2010:217
http://www.dovecot.org/list/dovecot-news/2010-July/000163.html
http://www.openwall.com/lists/oss-security/2010/09/16/14
http://www.openwall.com/lists/oss-security/2010/09/16/17
http://secunia.com/advisories/43220
SuSE Security Announcement: SUSE-SR:2010:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://www.ubuntu.com/usn/USN-1059-1
http://www.vupen.com/english/advisories/2010/2840
http://www.vupen.com/english/advisories/2011/0301
Common Vulnerability Exposure (CVE) ID: CVE-2010-3706
http://www.dovecot.org/list/dovecot/2010-October/053452.html
http://www.dovecot.org/list/dovecot/2010-October/053450.html
http://www.dovecot.org/list/dovecot/2010-October/053451.html
http://marc.info/?l=oss-security&m=128620520732377&w=2
http://marc.info/?l=oss-security&m=128622064325688&w=2
SuSE Security Announcement: SUSE-SR:2010:020 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html
http://www.vupen.com/english/advisories/2010/2572
Common Vulnerability Exposure (CVE) ID: CVE-2010-3707
http://www.redhat.com/support/errata/RHSA-2011-0600.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-3779
Common Vulnerability Exposure (CVE) ID: CVE-2010-3780
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.