Source: dovecot
Version: 1:2.3.4.1-5
Severity: grave
Tags: security upstream
Justification: user security hole
Control: found -1 1:2.2.27-3+deb9u4
Control: found -1 1:2.2.27-3
Control: fixed -1 1:2.2.27-3+deb9u5
Control: fixed -1 1:2.3.4.1-5+deb10u1

Hi,

The following vulnerability was published for dovecot.

CVE-2019-11500[0]:
| Nick Roessler and Rafi Rubin discovered that the IMAP and ManageSieve
| protocol parsers in the Dovecot email server do not properly validate
| input (both pre- and post-login). A remote attacker can take advantage
| of this flaw to trigger out of bounds heap memory writes, leading to
| information leaks or potentially the execution of arbitrary code.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-11500
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11500
[1] https://dovecot.org/pipermail/dovecot-news/2019-August/000418.html

Regards,
Salvatore

Reply via email to