CVE-2020-24386 - log back

CVE-2020-24386 edited at 05 Jan 2021 07:46:26
Severity
- Medium
+ High
Type
- Denial of service
+ Information disclosure
CVE-2020-24386 edited at 05 Jan 2021 07:44:53
Notes
+ Workaround
+ ==========
+
+ Operators can choose to disable IMAP hibernation. IMAP hibernation is not on by default. To ensure imap hibernation is disabled, make sure imap_hibernate_timeout is set to 0 or unset.
CVE-2020-24386 edited at 05 Jan 2021 07:44:39
Description
- A security issue was discovered in dovecot version 2.3.11 up to 2.3.11.3. Mail delivery/parsing crashed when the 10 000th MIME part was message/rfc822 (or if its parent was multipart/digest). This happened due to earlier MIME parsing changes for CVE-2020-12100. Malicious senders could crash dovecot repeatedly by sending/uploading messages with more than 10 000 MIME parts. The issue is fixed in dovecot version 2.3.13.
+ A security issue was discovered in dovecot version 2.2.26 up to 2.3.11.3. When imap hibernation is active, an attacker can cause dovecot to discover the file system directory structure and access other users' emails using a specially crafted command. The attacker must have valid credentials to access the mail server. The issue is fixed in dovecot version 2.3.13.
References
https://dovecot.org/pipermail/dovecot-news/2021-January/000450.html
- https://github.com/dovecot/core/commit/67f792cb98267ee74c425772e766e7a2525c0d8f
- https://github.com/dovecot/core/commit/6ae93c3936fc870c313a6fdf44a0999d4129d9b8
+ https://github.com/dovecot/core/commit/00df2308b0733e810824545183d73276c416cdd3
+ https://github.com/dovecot/core/commit/b4a9872b833b7985c7d0e7615f1b7fc812dd4c55
Notes
- Workaround
- ==========
-
- Such email messages are usually dropped by the mail transfer agent (MTA), where the mitigation can also be applied.
CVE-2020-24386 edited at 04 Jan 2021 14:14:48
References
https://dovecot.org/pipermail/dovecot-news/2021-January/000450.html
https://github.com/dovecot/core/commit/67f792cb98267ee74c425772e766e7a2525c0d8f
+ https://github.com/dovecot/core/commit/6ae93c3936fc870c313a6fdf44a0999d4129d9b8
CVE-2020-24386 edited at 04 Jan 2021 13:12:21
References
- https://www.openwall.com/lists/oss-security/2021/01/04/3
+ https://dovecot.org/pipermail/dovecot-news/2021-January/000450.html
https://github.com/dovecot/core/commit/67f792cb98267ee74c425772e766e7a2525c0d8f
CVE-2020-24386 edited at 04 Jan 2021 12:43:59
References
https://www.openwall.com/lists/oss-security/2021/01/04/3
+ https://github.com/dovecot/core/commit/67f792cb98267ee74c425772e766e7a2525c0d8f
CVE-2020-24386 edited at 04 Jan 2021 12:36:04
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Remote
Type
- Unknown
+ Denial of service
Description
+ A security issue was discovered in dovecot version 2.3.11 up to 2.3.11.3. Mail delivery/parsing crashed when the 10 000th MIME part was message/rfc822 (or if its parent was multipart/digest). This happened due to earlier MIME parsing changes for CVE-2020-12100. Malicious senders could crash dovecot repeatedly by sending/uploading messages with more than 10 000 MIME parts. The issue is fixed in dovecot version 2.3.13.
References
+ https://www.openwall.com/lists/oss-security/2021/01/04/3
Notes
+ Workaround
+ ==========
+
+ Such email messages are usually dropped by the mail transfer agent (MTA), where the mitigation can also be applied.
CVE-2020-24386 created at 04 Jan 2021 12:31:22