ALT-PU-2016-1063-1
Closed vulnerabilities
BDU:2015-00046
Уязвимость почтового сервера Dovecot, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании
Modified: 2025-04-11
CVE-2011-1929
lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
- http://dovecot.org/pipermail/dovecot/2011-May/059085.html
- http://dovecot.org/pipermail/dovecot/2011-May/059086.html
- http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html
- http://openwall.com/lists/oss-security/2011/05/18/4
- http://openwall.com/lists/oss-security/2011/05/19/3
- http://openwall.com/lists/oss-security/2011/05/19/6
- http://osvdb.org/72495
- http://secunia.com/advisories/44683
- http://secunia.com/advisories/44712
- http://secunia.com/advisories/44756
- http://secunia.com/advisories/44771
- http://secunia.com/advisories/44827
- http://www.debian.org/security/2011/dsa-2252
- http://www.dovecot.org/doc/NEWS-1.2
- http://www.dovecot.org/doc/NEWS-2.0
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:101
- http://www.redhat.com/support/errata/RHSA-2011-1187.html
- http://www.securityfocus.com/bid/47930
- http://www.ubuntu.com/usn/USN-1143-1
- https://bugzilla.redhat.com/show_bug.cgi?id=706286
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67589
- https://hermes.opensuse.org/messages/8581790
- http://dovecot.org/pipermail/dovecot/2011-May/059085.html
- http://dovecot.org/pipermail/dovecot/2011-May/059086.html
- http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html
- http://openwall.com/lists/oss-security/2011/05/18/4
- http://openwall.com/lists/oss-security/2011/05/19/3
- http://openwall.com/lists/oss-security/2011/05/19/6
- http://osvdb.org/72495
- http://secunia.com/advisories/44683
- http://secunia.com/advisories/44712
- http://secunia.com/advisories/44756
- http://secunia.com/advisories/44771
- http://secunia.com/advisories/44827
- http://www.debian.org/security/2011/dsa-2252
- http://www.dovecot.org/doc/NEWS-1.2
- http://www.dovecot.org/doc/NEWS-2.0
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:101
- http://www.redhat.com/support/errata/RHSA-2011-1187.html
- http://www.securityfocus.com/bid/47930
- http://www.ubuntu.com/usn/USN-1143-1
- https://bugzilla.redhat.com/show_bug.cgi?id=706286
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67589
- https://hermes.opensuse.org/messages/8581790
Modified: 2025-04-11
CVE-2011-2166
script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
- http://dovecot.org/pipermail/dovecot/2011-May/059085.html
- http://openwall.com/lists/oss-security/2011/05/18/4
- http://rhn.redhat.com/errata/RHSA-2013-0520.html
- http://secunia.com/advisories/52311
- http://www.dovecot.org/doc/NEWS-2.0
- http://www.securityfocus.com/bid/48003
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67675
- http://dovecot.org/pipermail/dovecot/2011-May/059085.html
- http://openwall.com/lists/oss-security/2011/05/18/4
- http://rhn.redhat.com/errata/RHSA-2013-0520.html
- http://secunia.com/advisories/52311
- http://www.dovecot.org/doc/NEWS-2.0
- http://www.securityfocus.com/bid/48003
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67675
Modified: 2025-04-11
CVE-2011-2167
script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
- http://dovecot.org/pipermail/dovecot/2011-May/059085.html
- http://openwall.com/lists/oss-security/2011/05/18/4
- http://rhn.redhat.com/errata/RHSA-2013-0520.html
- http://secunia.com/advisories/52311
- http://www.dovecot.org/doc/NEWS-2.0
- http://www.securityfocus.com/bid/48003
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67674
- http://dovecot.org/pipermail/dovecot/2011-May/059085.html
- http://openwall.com/lists/oss-security/2011/05/18/4
- http://rhn.redhat.com/errata/RHSA-2013-0520.html
- http://secunia.com/advisories/52311
- http://www.dovecot.org/doc/NEWS-2.0
- http://www.securityfocus.com/bid/48003
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67674
Modified: 2025-04-11
CVE-2011-4318
Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
- http://hg.dovecot.org/dovecot-2.0/rev/5e9eaf63a6b1
- http://rhn.redhat.com/errata/RHSA-2013-0520.html
- http://secunia.com/advisories/46886
- http://secunia.com/advisories/52311
- http://www.dovecot.org/list/dovecot-news/2011-November/000200.html
- http://www.openwall.com/lists/oss-security/2011/11/18/5
- http://www.openwall.com/lists/oss-security/2011/11/18/7
- https://bugs.gentoo.org/show_bug.cgi?id=390887
- https://bugzilla.redhat.com/show_bug.cgi?id=754980
- http://hg.dovecot.org/dovecot-2.0/rev/5e9eaf63a6b1
- http://rhn.redhat.com/errata/RHSA-2013-0520.html
- http://secunia.com/advisories/46886
- http://secunia.com/advisories/52311
- http://www.dovecot.org/list/dovecot-news/2011-November/000200.html
- http://www.openwall.com/lists/oss-security/2011/11/18/5
- http://www.openwall.com/lists/oss-security/2011/11/18/7
- https://bugs.gentoo.org/show_bug.cgi?id=390887
- https://bugzilla.redhat.com/show_bug.cgi?id=754980
Modified: 2025-04-12
CVE-2014-3430
Dovecot 1.1 before 2.2.13 and dovecot-ee before 2.1.7.7 and 2.2.x before 2.2.12.12 does not properly close old connections, which allows remote attackers to cause a denial of service (resource consumption) via an incomplete SSL/TLS handshake for an IMAP/POP3 connection.
- http://advisories.mageia.org/MGASA-2014-0223.html
- http://dovecot.org/pipermail/dovecot-news/2014-May/000273.html
- http://linux.oracle.com/errata/ELSA-2014-0790.html
- http://permalink.gmane.org/gmane.mail.imap.dovecot/77499
- http://rhn.redhat.com/errata/RHSA-2014-0790.html
- http://secunia.com/advisories/59051
- http://secunia.com/advisories/59537
- http://secunia.com/advisories/59552
- http://www.debian.org/security/2014/dsa-2954
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:113
- http://www.openwall.com/lists/oss-security/2014/05/09/4
- http://www.openwall.com/lists/oss-security/2014/05/09/8
- http://www.securityfocus.com/bid/67306
- http://www.ubuntu.com/usn/USN-2213-1
- http://advisories.mageia.org/MGASA-2014-0223.html
- http://dovecot.org/pipermail/dovecot-news/2014-May/000273.html
- http://linux.oracle.com/errata/ELSA-2014-0790.html
- http://permalink.gmane.org/gmane.mail.imap.dovecot/77499
- http://rhn.redhat.com/errata/RHSA-2014-0790.html
- http://secunia.com/advisories/59051
- http://secunia.com/advisories/59537
- http://secunia.com/advisories/59552
- http://www.debian.org/security/2014/dsa-2954
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:113
- http://www.openwall.com/lists/oss-security/2014/05/09/4
- http://www.openwall.com/lists/oss-security/2014/05/09/8
- http://www.securityfocus.com/bid/67306
- http://www.ubuntu.com/usn/USN-2213-1