Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.63248
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2009:0205
Resumen:The remote host is missing updates to Dovecot announced in;advisory RHSA-2009:0205.;;A flaw was found in Dovecot's ACL plug-in. The ACL plug-in treated negative;access rights as positive rights, which could allow an attacker to bypass;intended access restrictions. (CVE-2008-4577);;A password disclosure flaw was found with Dovecot's configuration file. If;a system had the ssl_key_password option defined, any local user could;view the SSL key password. (CVE-2008-4870);;Note: This flaw did not allow the attacker to acquire the contents of the;SSL key. The password has no value without the key file which arbitrary;users should not have read access to.;;To better protect even this value, however, the dovecot.conf file now;supports the !include_try directive. The ssl_key_password option should;be moved from dovecot.conf to a new file owned by, and only readable and;writable by, root (ie 0600). This file should be referenced from;dovecot.conf by setting the !include_try [/path/to/password/file] option.;;Additionally, a number of bug fixes were made (see the referenced;advisories for details).;;Users of dovecot are advised to upgrade to this updated package, which;addresses these vulnerabilities and resolves these issues.
Descripción:Summary:
The remote host is missing updates to Dovecot announced in
advisory RHSA-2009:0205.

A flaw was found in Dovecot's ACL plug-in. The ACL plug-in treated negative
access rights as positive rights, which could allow an attacker to bypass
intended access restrictions. (CVE-2008-4577)

A password disclosure flaw was found with Dovecot's configuration file. If
a system had the ssl_key_password option defined, any local user could
view the SSL key password. (CVE-2008-4870)

Note: This flaw did not allow the attacker to acquire the contents of the
SSL key. The password has no value without the key file which arbitrary
users should not have read access to.

To better protect even this value, however, the dovecot.conf file now
supports the !include_try directive. The ssl_key_password option should
be moved from dovecot.conf to a new file owned by, and only readable and
writable by, root (ie 0600). This file should be referenced from
dovecot.conf by setting the !include_try [/path/to/password/file] option.

Additionally, a number of bug fixes were made (see the referenced
advisories for details).

Users of dovecot are advised to upgrade to this updated package, which
addresses these vulnerabilities and resolves these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2008-4577
31587
http://www.securityfocus.com/bid/31587
32164
http://secunia.com/advisories/32164
32471
http://secunia.com/advisories/32471
33149
http://secunia.com/advisories/33149
33624
http://secunia.com/advisories/33624
36904
http://secunia.com/advisories/36904
ADV-2008-2745
http://www.vupen.com/english/advisories/2008/2745
FEDORA-2008-9202
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00816.html
FEDORA-2008-9232
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00844.html
GLSA-200812-16
http://security.gentoo.org/glsa/glsa-200812-16.xml
MDVSA-2008:232
http://www.mandriva.com/security/advisories?name=MDVSA-2008:232
RHSA-2009:0205
http://www.redhat.com/support/errata/RHSA-2009-0205.html
SUSE-SR:2009:004
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
USN-838-1
http://www.ubuntu.com/usn/USN-838-1
[Dovecot-news] 20081005 v1.1.4 released
http://www.dovecot.org/list/dovecot-news/2008-October/000085.html
http://bugs.gentoo.org/show_bug.cgi?id=240409
oval:org.mitre.oval:def:10376
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10376
Common Vulnerability Exposure (CVE) ID: CVE-2008-4870
http://www.openwall.com/lists/oss-security/2008/10/29/10
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10776
XForce ISS Database: dovecot-dovecot-information-disclosure(46323)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46323
CopyrightCopyright (C) 2009 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.