Dovecot 1.1 before 2.2.13 and dovecot-ee before 2.1.7.7 and 2.2.x before 2.2.12.12 does not properly close old connections, which allows remote attackers to cause a denial of service (resource consumption) via an incomplete SSL/TLS handshake for an IMAP/POP3 connection.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2014/05/09/4 | mailing list patch |
http://secunia.com/advisories/59051 | third party advisory |
http://www.openwall.com/lists/oss-security/2014/05/09/8 | mailing list |
http://secunia.com/advisories/59537 | third party advisory |
http://advisories.mageia.org/MGASA-2014-0223.html | |
http://permalink.gmane.org/gmane.mail.imap.dovecot/77499 | mailing list patch |
http://www.debian.org/security/2014/dsa-2954 | vendor advisory |
http://secunia.com/advisories/59552 | third party advisory |
http://www.ubuntu.com/usn/USN-2213-1 | vendor advisory |
http://www.securityfocus.com/bid/67306 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:113 | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2014-0790.html | vendor advisory |
http://linux.oracle.com/errata/ELSA-2014-0790.html | |
http://dovecot.org/pipermail/dovecot-news/2014-May/000273.html | mailing list patch vendor advisory |