Description |
- |
A security issue was discovered in dovecot version 2.3.11 up to 2.3.11.3. Mail delivery/parsing crashed when the 10 000th MIME part was message/rfc822 (or if its parent was multipart/digest). This happened due to earlier MIME parsing changes for CVE-2020-12100. Malicious senders could crash dovecot repeatedly by sending/uploading messages with more than 10 000 MIME parts. The issue is fixed in dovecot version 2.3.13. |
+ |
A security issue was discovered in dovecot version 2.2.26 up to 2.3.11.3. When imap hibernation is active, an attacker can cause dovecot to discover the file system directory structure and access other users' emails using a specially crafted command. The attacker must have valid credentials to access the mail server. The issue is fixed in dovecot version 2.3.13. |
|
References |
|
https://dovecot.org/pipermail/dovecot-news/2021-January/000450.html |
- |
https://github.com/dovecot/core/commit/67f792cb98267ee74c425772e766e7a2525c0d8f |
- |
https://github.com/dovecot/core/commit/6ae93c3936fc870c313a6fdf44a0999d4129d9b8 |
+ |
https://github.com/dovecot/core/commit/00df2308b0733e810824545183d73276c416cdd3 |
+ |
https://github.com/dovecot/core/commit/b4a9872b833b7985c7d0e7615f1b7fc812dd4c55 |
|
Notes |
- |
Workaround |
- |
========== |
- |
|
- |
Such email messages are usually dropped by the mail transfer agent (MTA), where the mitigation can also be applied. |
|