drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in dovecot
Name: |
Mehrere Probleme in dovecot |
|
ID: |
DSA-4745-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian buster |
|
Datum: |
Mi, 12. August 2020, 23:37 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12673
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12100 |
|
Applikationen: |
dovecot |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4745-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso August 12, 2020 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : dovecot CVE ID : CVE-2020-12100 CVE-2020-12673 CVE-2020-12674
Several vulnerabilities have been discovered in the Dovecot email server.
CVE-2020-12100
Receiving mail with deeply nested MIME parts leads to resource exhaustion as Dovecot attempts to parse it.
CVE-2020-12673
Dovecot's NTLM implementation does not correctly check message buffer size, which leads to a crash when reading past allocation.
CVE-2020-12674
Dovecot's RPA mechanism implementation accepts zero-length message, which leads to assert-crash later on.
For the stable distribution (buster), these problems have been fixed in version 1:2.3.4.1-5+deb10u3.
We recommend that you upgrade your dovecot packages.
For the detailed security status of dovecot please refer to its security tracker page at: https://security-tracker.debian.org/tracker/dovecot
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl80EBZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RvhRAAonS/PXa8HtA3Mb2b4wNjVZYj1CwXQTYIDivYLVtKP57qPshMYR7A/mLj WOwU6YUH6isCrNBk1EkyZCyKw968S5Cb0G2+UjadlELIJ+rNODpXMRRmh0MSSQ5z 7IimtwU/Fhlb097ppjR6uf8emN2pyTD5qA2piwgz0kYVwLMaxDE6ZoRdtapxZ2vs s9Bzat4TqPQXe5s/6+pjLceHEa2pFxm4tRueWvN4YfUkPkySSriJMrUSg0r8TXZ4 UEVCk3r3UB2nzvBxTRTaCwrmX5pSBaMPkv+Tpb1sgIAn5IfzNU17s4RAY17gRXOp f9IZtkR+IehEcgn7495XeGKsqvGjUeVD6x9pqfNMEYWMZgtK7PgxJBKkP+i4Yr7p AEA/ZRwd3FZFh7Vu4YwJUO+bnDmZglmsmHVw5FQzASUdY/6T9aLPBwZKmMoL0z6t Bdi9LTX9RJNTf8Okjf/R689IQkPqjBLE/gouWnHBQs9cUjQdGlbwDLZKb3Nf+6YF Y06hkWym7pLGSBL2aS05kQacJIji+Mj1/23wMRPOStwj/IygCv1Q8rLJlUtU8/sF rP5hBMRy56pqVKk4WHpBGNLBJNL7wLQBTFg0oJxkwS98I5fxJRJjtRRz3Y2G6Vcu Q2qM469h9BLftuU0w72RRJB5PZksYJkIbqsE5EH02VkSAxwxXhM= =z0rs -----END PGP SIGNATURE-----
|
|
|
|