Search criteria

6 vulnerabilities found for dovecot by The Dovecot Project

CVE-2017-15130 (GCVE-0-2017-15130)

Vulnerability from cvelistv5 – Published: 2018-03-02 15:00 – Updated: 2024-09-16 20:17
VLAI?
Summary
A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart.
Severity ?
No CVSS data available.
CWE
Assigner
References
https://usn.ubuntu.com/3587-1/ vendor-advisoryx_refsource_UBUNTU
http://seclists.org/oss-sec/2018/q1/205 mailing-listx_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2018… mailing-listx_refsource_MLIST
https://www.debian.org/security/2018/dsa-4130 vendor-advisoryx_refsource_DEBIAN
https://usn.ubuntu.com/3587-2/ vendor-advisoryx_refsource_UBUNTU
https://bugzilla.redhat.com/show_bug.cgi?id=1532356 x_refsource_CONFIRM
https://www.dovecot.org/list/dovecot-news/2018-Fe… mailing-listx_refsource_MLIST
Impacted products
Vendor Product Version
The Dovecot Project dovecot Affected: before 2.2.34
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:50:16.075Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-3587-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3587-1/"
          },
          {
            "name": "[oss-security] 20180301 Dovecot Security Advisory: CVE-2017-15130 TLS SNI config lookups are inefficient and can be used for DoS",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2018/q1/205"
          },
          {
            "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
          },
          {
            "name": "DSA-4130",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2018/dsa-4130"
          },
          {
            "name": "USN-3587-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3587-2/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532356"
          },
          {
            "name": "[dovecot-news] 20180228 v2.2.34 released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "dovecot",
          "vendor": "The Dovecot Project",
          "versions": [
            {
              "status": "affected",
              "version": "before 2.2.34"
            }
          ]
        }
      ],
      "datePublic": "2018-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-03T09:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "USN-3587-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3587-1/"
        },
        {
          "name": "[oss-security] 20180301 Dovecot Security Advisory: CVE-2017-15130 TLS SNI config lookups are inefficient and can be used for DoS",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2018/q1/205"
        },
        {
          "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
        },
        {
          "name": "DSA-4130",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2018/dsa-4130"
        },
        {
          "name": "USN-3587-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3587-2/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532356"
        },
        {
          "name": "[dovecot-news] 20180228 v2.2.34 released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "DATE_PUBLIC": "2018-02-28T00:00:00",
          "ID": "CVE-2017-15130",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "dovecot",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 2.2.34"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "The Dovecot Project"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-400"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-3587-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3587-1/"
            },
            {
              "name": "[oss-security] 20180301 Dovecot Security Advisory: CVE-2017-15130 TLS SNI config lookups are inefficient and can be used for DoS",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2018/q1/205"
            },
            {
              "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
            },
            {
              "name": "DSA-4130",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2018/dsa-4130"
            },
            {
              "name": "USN-3587-2",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3587-2/"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1532356",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532356"
            },
            {
              "name": "[dovecot-news] 20180228 v2.2.34 released",
              "refsource": "MLIST",
              "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2017-15130",
    "datePublished": "2018-03-02T15:00:00Z",
    "dateReserved": "2017-10-08T00:00:00",
    "dateUpdated": "2024-09-16T20:17:43.957Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-14461 (GCVE-0-2017-14461)

Vulnerability from cvelistv5 – Published: 2018-03-02 15:00 – Updated: 2024-09-16 23:00
VLAI?
Summary
A specially crafted email delivered over SMTP and passed on to Dovecot by MTA can trigger an out of bounds read resulting in potential sensitive information disclosure and denial of service. In order to trigger this vulnerability, an attacker needs to send a specially crafted email message to the server.
CWE
Assigner
References
https://usn.ubuntu.com/3587-1/ vendor-advisoryx_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2018… mailing-listx_refsource_MLIST
https://www.debian.org/security/2018/dsa-4130 vendor-advisoryx_refsource_DEBIAN
https://usn.ubuntu.com/3587-2/ vendor-advisoryx_refsource_UBUNTU
http://www.securityfocus.com/bid/103201 vdb-entryx_refsource_BID
https://www.dovecot.org/list/dovecot-news/2018-Fe… mailing-listx_refsource_MLIST
https://talosintelligence.com/vulnerability_repor… x_refsource_MISC
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:27:40.633Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-3587-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3587-1/"
          },
          {
            "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
          },
          {
            "name": "DSA-4130",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2018/dsa-4130"
          },
          {
            "name": "USN-3587-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3587-2/"
          },
          {
            "name": "103201",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103201"
          },
          {
            "name": "[dovecot-news] 20180228 v2.2.34 released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0510"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Dovecot",
          "vendor": "The Dovecot Project",
          "versions": [
            {
              "status": "affected",
              "version": "2.2.33.2"
            }
          ]
        }
      ],
      "datePublic": "2018-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A specially crafted email delivered over SMTP and passed on to Dovecot by MTA can trigger an out of bounds read resulting in potential sensitive information disclosure and denial of service. In order to trigger this vulnerability, an attacker needs to send a specially crafted email message to the server."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125: Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-19T18:21:09",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "name": "USN-3587-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3587-1/"
        },
        {
          "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
        },
        {
          "name": "DSA-4130",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2018/dsa-4130"
        },
        {
          "name": "USN-3587-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3587-2/"
        },
        {
          "name": "103201",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103201"
        },
        {
          "name": "[dovecot-news] 20180228 v2.2.34 released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0510"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "talos-cna@cisco.com",
          "DATE_PUBLIC": "2018-02-28T00:00:00",
          "ID": "CVE-2017-14461",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Dovecot",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.2.33.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "The Dovecot Project"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A specially crafted email delivered over SMTP and passed on to Dovecot by MTA can trigger an out of bounds read resulting in potential sensitive information disclosure and denial of service. In order to trigger this vulnerability, an attacker needs to send a specially crafted email message to the server."
            }
          ]
        },
        "impact": {
          "cvss": {
            "baseScore": 5.9,
            "baseSeverity": "Medium",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-125: Out-of-bounds Read"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-3587-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3587-1/"
            },
            {
              "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
            },
            {
              "name": "DSA-4130",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2018/dsa-4130"
            },
            {
              "name": "USN-3587-2",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3587-2/"
            },
            {
              "name": "103201",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103201"
            },
            {
              "name": "[dovecot-news] 20180228 v2.2.34 released",
              "refsource": "MLIST",
              "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
            },
            {
              "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0510",
              "refsource": "MISC",
              "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0510"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2017-14461",
    "datePublished": "2018-03-02T15:00:00Z",
    "dateReserved": "2017-09-13T00:00:00",
    "dateUpdated": "2024-09-16T23:00:46.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-15132 (GCVE-0-2017-15132)

Vulnerability from cvelistv5 – Published: 2018-01-25 20:00 – Updated: 2024-09-17 00:36
VLAI?
Summary
A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion.
Severity ?
No CVSS data available.
CWE
Assigner
References
https://github.com/dovecot/core/commit/1a29ed2f96… x_refsource_CONFIRM
https://lists.debian.org/debian-lts-announce/2018… mailing-listx_refsource_MLIST
https://bugzilla.redhat.com/show_bug.cgi?id=1532768 x_refsource_CONFIRM
https://www.debian.org/security/2018/dsa-4130 vendor-advisoryx_refsource_DEBIAN
https://usn.ubuntu.com/3556-1/ vendor-advisoryx_refsource_UBUNTU
https://usn.ubuntu.com/3556-2/ vendor-advisoryx_refsource_UBUNTU
https://www.dovecot.org/list/dovecot-news/2018-Fe… mailing-listx_refsource_MLIST
Impacted products
Vendor Product Version
The Dovecot Project dovecot Affected: 2.0 up to 2.2.33 and 2.3.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:50:16.152Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/dovecot/core/commit/1a29ed2f96da1be22fa5a4d96c7583aa81b8b060.patch"
          },
          {
            "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532768"
          },
          {
            "name": "DSA-4130",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2018/dsa-4130"
          },
          {
            "name": "USN-3556-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3556-1/"
          },
          {
            "name": "USN-3556-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3556-2/"
          },
          {
            "name": "[dovecot-news] 20180228 v2.2.34 released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "dovecot",
          "vendor": "The Dovecot Project",
          "versions": [
            {
              "status": "affected",
              "version": "2.0 up to 2.2.33 and 2.3.0"
            }
          ]
        }
      ],
      "datePublic": "2018-01-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot\u0027s auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-01T09:57:02",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/dovecot/core/commit/1a29ed2f96da1be22fa5a4d96c7583aa81b8b060.patch"
        },
        {
          "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532768"
        },
        {
          "name": "DSA-4130",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2018/dsa-4130"
        },
        {
          "name": "USN-3556-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3556-1/"
        },
        {
          "name": "USN-3556-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3556-2/"
        },
        {
          "name": "[dovecot-news] 20180228 v2.2.34 released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "DATE_PUBLIC": "2018-01-25T00:00:00",
          "ID": "CVE-2017-15132",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "dovecot",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.0 up to 2.2.33 and 2.3.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "The Dovecot Project"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot\u0027s auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-400"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/dovecot/core/commit/1a29ed2f96da1be22fa5a4d96c7583aa81b8b060.patch",
              "refsource": "CONFIRM",
              "url": "https://github.com/dovecot/core/commit/1a29ed2f96da1be22fa5a4d96c7583aa81b8b060.patch"
            },
            {
              "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1532768",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532768"
            },
            {
              "name": "DSA-4130",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2018/dsa-4130"
            },
            {
              "name": "USN-3556-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3556-1/"
            },
            {
              "name": "USN-3556-2",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3556-2/"
            },
            {
              "name": "[dovecot-news] 20180228 v2.2.34 released",
              "refsource": "MLIST",
              "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2017-15132",
    "datePublished": "2018-01-25T20:00:00Z",
    "dateReserved": "2017-10-08T00:00:00",
    "dateUpdated": "2024-09-17T00:36:33.953Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-15130 (GCVE-0-2017-15130)

Vulnerability from nvd – Published: 2018-03-02 15:00 – Updated: 2024-09-16 20:17
VLAI?
Summary
A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart.
Severity ?
No CVSS data available.
CWE
Assigner
References
https://usn.ubuntu.com/3587-1/ vendor-advisoryx_refsource_UBUNTU
http://seclists.org/oss-sec/2018/q1/205 mailing-listx_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2018… mailing-listx_refsource_MLIST
https://www.debian.org/security/2018/dsa-4130 vendor-advisoryx_refsource_DEBIAN
https://usn.ubuntu.com/3587-2/ vendor-advisoryx_refsource_UBUNTU
https://bugzilla.redhat.com/show_bug.cgi?id=1532356 x_refsource_CONFIRM
https://www.dovecot.org/list/dovecot-news/2018-Fe… mailing-listx_refsource_MLIST
Impacted products
Vendor Product Version
The Dovecot Project dovecot Affected: before 2.2.34
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:50:16.075Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-3587-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3587-1/"
          },
          {
            "name": "[oss-security] 20180301 Dovecot Security Advisory: CVE-2017-15130 TLS SNI config lookups are inefficient and can be used for DoS",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2018/q1/205"
          },
          {
            "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
          },
          {
            "name": "DSA-4130",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2018/dsa-4130"
          },
          {
            "name": "USN-3587-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3587-2/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532356"
          },
          {
            "name": "[dovecot-news] 20180228 v2.2.34 released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "dovecot",
          "vendor": "The Dovecot Project",
          "versions": [
            {
              "status": "affected",
              "version": "before 2.2.34"
            }
          ]
        }
      ],
      "datePublic": "2018-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-03T09:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "USN-3587-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3587-1/"
        },
        {
          "name": "[oss-security] 20180301 Dovecot Security Advisory: CVE-2017-15130 TLS SNI config lookups are inefficient and can be used for DoS",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2018/q1/205"
        },
        {
          "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
        },
        {
          "name": "DSA-4130",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2018/dsa-4130"
        },
        {
          "name": "USN-3587-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3587-2/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532356"
        },
        {
          "name": "[dovecot-news] 20180228 v2.2.34 released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "DATE_PUBLIC": "2018-02-28T00:00:00",
          "ID": "CVE-2017-15130",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "dovecot",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 2.2.34"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "The Dovecot Project"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-400"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-3587-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3587-1/"
            },
            {
              "name": "[oss-security] 20180301 Dovecot Security Advisory: CVE-2017-15130 TLS SNI config lookups are inefficient and can be used for DoS",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2018/q1/205"
            },
            {
              "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
            },
            {
              "name": "DSA-4130",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2018/dsa-4130"
            },
            {
              "name": "USN-3587-2",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3587-2/"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1532356",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532356"
            },
            {
              "name": "[dovecot-news] 20180228 v2.2.34 released",
              "refsource": "MLIST",
              "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2017-15130",
    "datePublished": "2018-03-02T15:00:00Z",
    "dateReserved": "2017-10-08T00:00:00",
    "dateUpdated": "2024-09-16T20:17:43.957Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-14461 (GCVE-0-2017-14461)

Vulnerability from nvd – Published: 2018-03-02 15:00 – Updated: 2024-09-16 23:00
VLAI?
Summary
A specially crafted email delivered over SMTP and passed on to Dovecot by MTA can trigger an out of bounds read resulting in potential sensitive information disclosure and denial of service. In order to trigger this vulnerability, an attacker needs to send a specially crafted email message to the server.
CWE
Assigner
References
https://usn.ubuntu.com/3587-1/ vendor-advisoryx_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2018… mailing-listx_refsource_MLIST
https://www.debian.org/security/2018/dsa-4130 vendor-advisoryx_refsource_DEBIAN
https://usn.ubuntu.com/3587-2/ vendor-advisoryx_refsource_UBUNTU
http://www.securityfocus.com/bid/103201 vdb-entryx_refsource_BID
https://www.dovecot.org/list/dovecot-news/2018-Fe… mailing-listx_refsource_MLIST
https://talosintelligence.com/vulnerability_repor… x_refsource_MISC
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:27:40.633Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-3587-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3587-1/"
          },
          {
            "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
          },
          {
            "name": "DSA-4130",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2018/dsa-4130"
          },
          {
            "name": "USN-3587-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3587-2/"
          },
          {
            "name": "103201",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103201"
          },
          {
            "name": "[dovecot-news] 20180228 v2.2.34 released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0510"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Dovecot",
          "vendor": "The Dovecot Project",
          "versions": [
            {
              "status": "affected",
              "version": "2.2.33.2"
            }
          ]
        }
      ],
      "datePublic": "2018-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A specially crafted email delivered over SMTP and passed on to Dovecot by MTA can trigger an out of bounds read resulting in potential sensitive information disclosure and denial of service. In order to trigger this vulnerability, an attacker needs to send a specially crafted email message to the server."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125: Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-19T18:21:09",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "name": "USN-3587-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3587-1/"
        },
        {
          "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
        },
        {
          "name": "DSA-4130",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2018/dsa-4130"
        },
        {
          "name": "USN-3587-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3587-2/"
        },
        {
          "name": "103201",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103201"
        },
        {
          "name": "[dovecot-news] 20180228 v2.2.34 released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0510"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "talos-cna@cisco.com",
          "DATE_PUBLIC": "2018-02-28T00:00:00",
          "ID": "CVE-2017-14461",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Dovecot",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.2.33.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "The Dovecot Project"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A specially crafted email delivered over SMTP and passed on to Dovecot by MTA can trigger an out of bounds read resulting in potential sensitive information disclosure and denial of service. In order to trigger this vulnerability, an attacker needs to send a specially crafted email message to the server."
            }
          ]
        },
        "impact": {
          "cvss": {
            "baseScore": 5.9,
            "baseSeverity": "Medium",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-125: Out-of-bounds Read"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-3587-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3587-1/"
            },
            {
              "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
            },
            {
              "name": "DSA-4130",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2018/dsa-4130"
            },
            {
              "name": "USN-3587-2",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3587-2/"
            },
            {
              "name": "103201",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103201"
            },
            {
              "name": "[dovecot-news] 20180228 v2.2.34 released",
              "refsource": "MLIST",
              "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
            },
            {
              "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0510",
              "refsource": "MISC",
              "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0510"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2017-14461",
    "datePublished": "2018-03-02T15:00:00Z",
    "dateReserved": "2017-09-13T00:00:00",
    "dateUpdated": "2024-09-16T23:00:46.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-15132 (GCVE-0-2017-15132)

Vulnerability from nvd – Published: 2018-01-25 20:00 – Updated: 2024-09-17 00:36
VLAI?
Summary
A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion.
Severity ?
No CVSS data available.
CWE
Assigner
References
https://github.com/dovecot/core/commit/1a29ed2f96… x_refsource_CONFIRM
https://lists.debian.org/debian-lts-announce/2018… mailing-listx_refsource_MLIST
https://bugzilla.redhat.com/show_bug.cgi?id=1532768 x_refsource_CONFIRM
https://www.debian.org/security/2018/dsa-4130 vendor-advisoryx_refsource_DEBIAN
https://usn.ubuntu.com/3556-1/ vendor-advisoryx_refsource_UBUNTU
https://usn.ubuntu.com/3556-2/ vendor-advisoryx_refsource_UBUNTU
https://www.dovecot.org/list/dovecot-news/2018-Fe… mailing-listx_refsource_MLIST
Impacted products
Vendor Product Version
The Dovecot Project dovecot Affected: 2.0 up to 2.2.33 and 2.3.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:50:16.152Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/dovecot/core/commit/1a29ed2f96da1be22fa5a4d96c7583aa81b8b060.patch"
          },
          {
            "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532768"
          },
          {
            "name": "DSA-4130",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2018/dsa-4130"
          },
          {
            "name": "USN-3556-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3556-1/"
          },
          {
            "name": "USN-3556-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3556-2/"
          },
          {
            "name": "[dovecot-news] 20180228 v2.2.34 released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "dovecot",
          "vendor": "The Dovecot Project",
          "versions": [
            {
              "status": "affected",
              "version": "2.0 up to 2.2.33 and 2.3.0"
            }
          ]
        }
      ],
      "datePublic": "2018-01-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot\u0027s auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-01T09:57:02",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/dovecot/core/commit/1a29ed2f96da1be22fa5a4d96c7583aa81b8b060.patch"
        },
        {
          "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532768"
        },
        {
          "name": "DSA-4130",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2018/dsa-4130"
        },
        {
          "name": "USN-3556-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3556-1/"
        },
        {
          "name": "USN-3556-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3556-2/"
        },
        {
          "name": "[dovecot-news] 20180228 v2.2.34 released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "DATE_PUBLIC": "2018-01-25T00:00:00",
          "ID": "CVE-2017-15132",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "dovecot",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.0 up to 2.2.33 and 2.3.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "The Dovecot Project"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot\u0027s auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-400"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/dovecot/core/commit/1a29ed2f96da1be22fa5a4d96c7583aa81b8b060.patch",
              "refsource": "CONFIRM",
              "url": "https://github.com/dovecot/core/commit/1a29ed2f96da1be22fa5a4d96c7583aa81b8b060.patch"
            },
            {
              "name": "[debian-lts-announce] 20180331 [SECURITY] [DLA 1333-1] dovecot security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1532768",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532768"
            },
            {
              "name": "DSA-4130",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2018/dsa-4130"
            },
            {
              "name": "USN-3556-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3556-1/"
            },
            {
              "name": "USN-3556-2",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3556-2/"
            },
            {
              "name": "[dovecot-news] 20180228 v2.2.34 released",
              "refsource": "MLIST",
              "url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2017-15132",
    "datePublished": "2018-01-25T20:00:00Z",
    "dateReserved": "2017-10-08T00:00:00",
    "dateUpdated": "2024-09-17T00:36:33.953Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}