Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.62926
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDVSA-2008:232 (dovecot)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to dovecot
announced via advisory MDVSA-2008:232.

The ACL plugin in dovecot prior to version 1.1.4 treated negative
access rights as though they were positive access rights, which allowed
attackers to bypass intended access restrictions (CVE-2008-4577).

The ACL plugin in dovecot prior to version 1.1.6 allowed attackers to
bypass intended access restrictions by using the 'k' right to create
unauthorized 'parent/child/child' mailboxes (CVE-2008-4578).

In addition, two bugs were discovered in the dovecot package shipped
with Mandriva Linux 2009.0. The default permissions on the dovecot.conf
configuration file were too restrictive, which prevents the use of
dovecot's 'deliver' command as a non-root user. Secondly, dovecot
should not start until after ntpd, if ntpd is active, because if ntpd
corrects the time backwards while dovecot is running, dovecot will
quit automatically, with the log message 'Time just moved backwards
by X seconds. This might cause a lot of problems, so I'll just kill
myself now.' The update resolves both these problems. The default
permissions on dovecot.conf now allow the 'deliver' command to read the
file. Note that if you edited dovecot.conf at all prior to installing
the update, the new permissions may not be applied. If you find the
'deliver' command still does not work following the update, please
run these commands as root:

# chmod 0640 /etc/dovecot.conf
# chown root:mail /etc/dovecot.conf

Dovecot's initialization script now configures it to start after the
ntpd service, to ensure ntpd resetting the clock does not interfere
with Dovecot operation.

This package corrects the above-noted bugs and security issues by
upgrading to the latest dovecot 1.1.6, which also provides additional
bug fixes.

Affected: 2009.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2008:232

Risk factor : High

CVSS Score:
6.4

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-4577
31587
http://www.securityfocus.com/bid/31587
32164
http://secunia.com/advisories/32164
32471
http://secunia.com/advisories/32471
33149
http://secunia.com/advisories/33149
33624
http://secunia.com/advisories/33624
36904
http://secunia.com/advisories/36904
ADV-2008-2745
http://www.vupen.com/english/advisories/2008/2745
FEDORA-2008-9202
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00816.html
FEDORA-2008-9232
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00844.html
GLSA-200812-16
http://security.gentoo.org/glsa/glsa-200812-16.xml
MDVSA-2008:232
http://www.mandriva.com/security/advisories?name=MDVSA-2008:232
RHSA-2009:0205
http://www.redhat.com/support/errata/RHSA-2009-0205.html
SUSE-SR:2009:004
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
USN-838-1
http://www.ubuntu.com/usn/USN-838-1
[Dovecot-news] 20081005 v1.1.4 released
http://www.dovecot.org/list/dovecot-news/2008-October/000085.html
http://bugs.gentoo.org/show_bug.cgi?id=240409
oval:org.mitre.oval:def:10376
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10376
Common Vulnerability Exposure (CVE) ID: CVE-2008-4578
20081119 Re: [ MDVSA-2008:232 ] dovecot
http://www.securityfocus.com/archive/1/498498/100/0/threaded
dovecot-acl-mailbox-security-bypass(45669)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45669
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.