The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.dovecot.org/list/dovecot-news/2008-October/000089.html | mailing list |
http://secunia.com/advisories/33149 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46227 | vdb entry |
http://www.ubuntu.com/usn/usn-666-1 | vendor advisory |
http://www.securityfocus.com/bid/31997 | vdb entry patch |
http://security.gentoo.org/glsa/glsa-200812-16.xml | vendor advisory |
http://secunia.com/advisories/32677 | third party advisory |
http://secunia.com/advisories/32479 | third party advisory patch vendor advisory |