ArchLinux: 201905-6: dovecot: denial of service

    Date 07 May 2019
    490
    Posted By LinuxSecurity Advisories
    The package dovecot before version 2.3.6-1 is vulnerable to denial of service.
    Arch Linux Security Advisory ASA-201905-6
    =========================================
    
    Severity: Medium
    Date    : 2019-05-06
    CVE-ID  : CVE-2019-11494 CVE-2019-11499
    Package : dovecot
    Type    : denial of service
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-954
    
    Summary
    =======
    
    The package dovecot before version 2.3.6-1 is vulnerable to denial of
    service.
    
    Resolution
    ==========
    
    Upgrade to 2.3.6-1.
    
    # pacman -Syu "dovecot>=2.3.6-1"
    
    The problems have been fixed upstream in version 2.3.6.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    - CVE-2019-11494 (denial of service)
    
    Submission-login crashes with signal 11 due to null pointer access when
    authentication is aborted by disconnecting. This can lead to denial-of
    service attack by persistent attacker(s).
    
    - CVE-2019-11499 (denial of service)
    
    Submission-login crashes when authentication is started over TLS
    secured channel and invalid authentication message is sent. This can
    lead to denial-of-service attack by persistent attacker(s).
    
    Impact
    ======
    
    A remote attacker is able to cause a denial of service by sending
    invalid authentication messages or aborting the authentication process.
    
    References
    ==========
    
    https://dovecot.org/doc/NEWS-2.3
    https://www.mail-archive.com/This email address is being protected from spambots. You need JavaScript enabled to view it./msg06126.html
    https://dovecot.org/pipermail/dovecot/2019-April/115757.html
    https://dovecot.org/pipermail/dovecot/2019-April/115758.html
    https://security.archlinux.org/CVE-2019-11494
    https://security.archlinux.org/CVE-2019-11499
    

    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/36-have-you-ever-used-tcpdump-for-network-troubleshooting-or-debugging?task=poll.vote&format=json
    36
    radio
    [{"id":"125","title":"Yes","votes":"36","type":"x","order":"1","pct":80,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":20,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.