ESB-2019.0393 - [Debian] dovecot: Access confidential data - Remote/unauthenticated 2019-02-08

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.0393
                   [DLA 1667-1] dovecot security update
                              8 February 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           dovecot
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-3814  

Reference:         ESB-2019.0331
                   ESB-2019.0330

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2019/02/msg00012.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Package        : dovecot
Version        : 1:2.2.13-12~deb8u5
CVE ID         : CVE-2019-3814

It was discovered that there was a vulnerability in the dovecot
IMAP/POP3 server.

A flaw in the TLS username handling could lead to an attacker
logging in as anyone else in the system if both
auth_ssl_{require_client,username_from}_cert were enabled.

For Debian 8 "Jessie", this issue has been fixed in dovecot version
1:2.2.13-12~deb8u5.

We recommend that you upgrade your dovecot packages.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=KW64
-----END PGP SIGNATURE-----

« Back to bulletins