Check CVE Id
Check CWE Id
In the IMAP Server in Dovecot 2.3.3 through 18.104.22.168, the submission-login service crashes when the client disconnects prematurely during the AUTH command.
(Improper Input Validation)
CVSS Base Score
In Dovecot before 22.214.171.124 and 2.3.x before 126.96.36.199 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution.
In the IMAP Server in Dovecot 2.3.3 through 188.8.131.52, the submission-login component crashes if AUTH PLAIN is attempted over a TLS secured channel with an unacceptable authentication message.
The JSON encoder in Dovecot before 184.108.40.206 allows attackers to repeatedly crash the authentication service by attempting to authenticate with an invalid UTF-8 sequence as the username.
In Dovecot before 220.127.116.11 and 2.3.x before 18.104.22.168, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.
It was discovered that Dovecot before versions 22.214.171.124 and 126.96.36.199 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.
Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending speci...
A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart.
A specially crafted email delivered over SMTP and passed on to Dovecot by MTA can trigger an out of bounds read resulting in potential sensitive information disclosure and denial of service. In order to trigger this vulnerability, an attacker needs t...
Back to Top