Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.60960
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2008:0297
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2008:0297.

Dovecot is an IMAP server for Linux and UNIX-like systems, primarily
written with security in mind.

A flaw was discovered in the way Dovecot handled the mail_extra_groups
option. An authenticated attacker with local shell access could leverage
this flaw to read, modify, or delete other users mail that is stored on
the mail server. (CVE-2008-1199)

This issue did not affect the default Red Hat Enterprise Linux 5 Dovecot
configuration. This update adds two new configuration options --
mail_privileged_group and mail_access_groups -- to minimize the usage
of additional privileges.

A directory traversal flaw was discovered in Dovecot's zlib plug-in. An
authenticated user could use this flaw to view other compressed mailboxes
with the permissions of the Dovecot process. (CVE-2007-2231)

A flaw was found in the Dovecot ACL plug-in. User with only insert
permissions for a mailbox could use the COPY and APPEND commands to set
additional message flags. (CVE-2007-4211)

A flaw was found in a way Dovecot cached LDAP query results in certain
configurations. This could possibly allow authenticated users to log in as
a different user who has the same password. (CVE-2007-6598)

Note: this updated package upgrades dovecot to version 1.0.7. For
further details, refer to the Dovecot changelog:
http://koji.fedoraproject.org/koji/buildinfo?buildID=23397

Users of dovecot are advised to upgrade to this updated package, which
resolves these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2008-0297.html
http://www.redhat.com/security/updates/classification/#low

Risk factor : High

CVSS Score:
6.8

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-2231
BugTraq ID: 23552
http://www.securityfocus.com/bid/23552
Bugtraq: 20070418 rPSA-2007-0074-1 dovecot (Google Search)
http://www.securityfocus.com/archive/1/466168/100/0/threaded
Debian Security Information: DSA-1359 (Google Search)
http://www.debian.org/security/2007/dsa-1359
http://dovecot.org/list/dovecot-cvs/2007-March/008488.html
http://dovecot.org/list/dovecot-news/2007-March/000038.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10995
http://www.redhat.com/support/errata/RHSA-2008-0297.html
http://secunia.com/advisories/25072
http://secunia.com/advisories/30342
SuSE Security Announcement: SUSE-SR:2007:008 (Google Search)
http://www.novell.com/linux/security/advisories/2007_8_sr.html
http://www.ubuntu.com/usn/usn-487-1
http://www.vupen.com/english/advisories/2007/1452
XForce ISS Database: dovecot-mboxstorage-directory-traversal(34082)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34082
Common Vulnerability Exposure (CVE) ID: CVE-2007-4211
BugTraq ID: 25182
http://www.securityfocus.com/bid/25182
http://www.dovecot.org/list/dovecot-news/2007-August/000048.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11558
http://secunia.com/advisories/26320
http://secunia.com/advisories/26475
XForce ISS Database: dovecot-aclplugin-security-bypass(35767)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35767
Common Vulnerability Exposure (CVE) ID: CVE-2007-6598
BugTraq ID: 27093
http://www.securityfocus.com/bid/27093
Bugtraq: 20080103 Re: rPSA-2008-0001-1 dovecot (Google Search)
http://www.securityfocus.com/archive/1/485787/100/0/threaded
Bugtraq: 20080103 rPSA-2008-0001-1 dovecot (Google Search)
http://www.securityfocus.com/archive/1/485779/100/0/threaded
Debian Security Information: DSA-1457 (Google Search)
http://www.debian.org/security/2008/dsa-1457
http://dovecot.org/list/dovecot-news/2007-December/000057.html
http://dovecot.org/list/dovecot-news/2007-December/000058.html
http://osvdb.org/39876
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10458
http://secunia.com/advisories/28227
http://secunia.com/advisories/28271
http://secunia.com/advisories/28404
http://secunia.com/advisories/28434
http://secunia.com/advisories/32151
SuSE Security Announcement: SUSE-SR:2008:020 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://www.ubuntu.com/usn/usn-567-1
http://www.vupen.com/english/advisories/2008/0017
Common Vulnerability Exposure (CVE) ID: CVE-2008-1199
BugTraq ID: 28092
http://www.securityfocus.com/bid/28092
Bugtraq: 20080304 Dovecot mail_extra_groups setting is often used insecurely (Google Search)
http://www.securityfocus.com/archive/1/489133/100/0/threaded
Debian Security Information: DSA-1516 (Google Search)
http://www.debian.org/security/2008/dsa-1516
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00358.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00381.html
http://security.gentoo.org/glsa/glsa-200803-25.xml
http://www.dovecot.org/list/dovecot-news/2008-March/000061.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10739
http://secunia.com/advisories/29226
http://secunia.com/advisories/29385
http://secunia.com/advisories/29396
http://secunia.com/advisories/29557
https://usn.ubuntu.com/593-1/
XForce ISS Database: dovecot-mailextragroups-unauth-access(41009)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41009
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.