You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa dovecot

Sigurnosni nedostaci programskog paketa dovecot

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-4745-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 12, 2020 https://www.debian.org/security/faq
– ————————————————————————-

Package : dovecot
CVE ID : CVE-2020-12100 CVE-2020-12673 CVE-2020-12674

Several vulnerabilities have been discovered in the Dovecot email
server.

CVE-2020-12100

Receiving mail with deeply nested MIME parts leads to resource
exhaustion as Dovecot attempts to parse it.

CVE-2020-12673

Dovecot’s NTLM implementation does not correctly check message
buffer size, which leads to a crash when reading past allocation.

CVE-2020-12674

Dovecot’s RPA mechanism implementation accepts zero-length message,
which leads to assert-crash later on.

For the stable distribution (buster), these problems have been fixed in
version 1:2.3.4.1-5+deb10u3.

We recommend that you upgrade your dovecot packages.

For the detailed security status of dovecot please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/dovecot

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl80EBZfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0RvhRAAonS/PXa8HtA3Mb2b4wNjVZYj1CwXQTYIDivYLVtKP57qPshMYR7A/mLj
WOwU6YUH6isCrNBk1EkyZCyKw968S5Cb0G2+UjadlELIJ+rNODpXMRRmh0MSSQ5z
7IimtwU/Fhlb097ppjR6uf8emN2pyTD5qA2piwgz0kYVwLMaxDE6ZoRdtapxZ2vs
s9Bzat4TqPQXe5s/6+pjLceHEa2pFxm4tRueWvN4YfUkPkySSriJMrUSg0r8TXZ4
UEVCk3r3UB2nzvBxTRTaCwrmX5pSBaMPkv+Tpb1sgIAn5IfzNU17s4RAY17gRXOp
f9IZtkR+IehEcgn7495XeGKsqvGjUeVD6x9pqfNMEYWMZgtK7PgxJBKkP+i4Yr7p
AEA/ZRwd3FZFh7Vu4YwJUO+bnDmZglmsmHVw5FQzASUdY/6T9aLPBwZKmMoL0z6t
Bdi9LTX9RJNTf8Okjf/R689IQkPqjBLE/gouWnHBQs9cUjQdGlbwDLZKb3Nf+6YF
Y06hkWym7pLGSBL2aS05kQacJIji+Mj1/23wMRPOStwj/IygCv1Q8rLJlUtU8/sF
rP5hBMRy56pqVKk4WHpBGNLBJNL7wLQBTFg0oJxkwS98I5fxJRJjtRRz3Y2G6Vcu
Q2qM469h9BLftuU0w72RRJB5PZksYJkIbqsE5EH02VkSAxwxXhM=
=z0rs
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa java-11-openjdk

Otkriveni su sigurnosni nedostaci u programskom paketu java-11-openjdk za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja...

Close