ArchLinux: 201902-1: dovecot: authentication bypass
Summary
A vulnerability has been found in Dovecot versions prior to 2.3.4.1, allowing a remote client in possession of a trusted SSL certificate to log in as any user, in some configurations. This affects only installations using auth_ssl_require_client_cert yes and auth_ssl_username_from_cert = yes, and the the attacker might have access to a trusted certificate without the ssl_cert_username_field (default to commonName) set in it.
Resolution
Upgrade to 2.3.4.1-1.
# pacman -Syu "dovecot>=2.3.4.1-1"
The problem has been fixed upstream in version 2.3.4.1.
References
https://www.dovecot.org/pipermail/dovecot/2019-February/114575.html https://github.com/dovecot/core/commit/61471a5c42528090cffcca9bceded316746637b7 https://security.archlinux.org/CVE-2019-3814
Workaround
None.