Vulnerabilities > Dovecot
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2010-05-20 | CVE-2010-0745 | Resource Management Errors vulnerability in Dovecot Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message. | 5.0 |
2009-11-24 | CVE-2009-3897 | Incorrect Permission Assignment for Critical Resource vulnerability in Dovecot Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself. | 5.5 |
2009-09-17 | CVE-2009-3235 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Dovecot Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632. | 7.5 |
2008-12-01 | CVE-2008-5301 | Path Traversal vulnerability in Dovecot Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name. | 6.4 |
2008-11-04 | CVE-2008-4907 | Improper Input Validation vulnerability in Dovecot 1.1.4/1.1.5 The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug." | 4.3 |
2008-11-01 | CVE-2008-4870 | Incorrect Permission Assignment for Critical Resource vulnerability in Dovecot 1.0.7 dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value. | 2.1 |
2008-10-15 | CVE-2008-4578 | Permissions, Privileges, and Access Controls vulnerability in Dovecot The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes. | 5.0 |
2008-10-15 | CVE-2008-4577 | Incorrect Authorization vulnerability in multiple products The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions. | 7.5 |
2008-03-10 | CVE-2008-1218 | Credentials Management vulnerability in Dovecot Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified. | 6.8 |
2008-03-06 | CVE-2008-1199 | Configuration vulnerability in Dovecot Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack. | 4.4 |