Lucene search

K
archlinuxArchLinuxASA-201902-1
HistoryFeb 06, 2019 - 12:00 a.m.

[ASA-201902-1] dovecot: authentication bypass

2019-02-0600:00:00
security.archlinux.org
16

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N

4.9 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

0.002 Low

EPSS

Percentile

62.1%

Arch Linux Security Advisory ASA-201902-1

Severity: High
Date : 2019-02-06
CVE-ID : CVE-2019-3814
Package : dovecot
Type : authentication bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-872

Summary

The package dovecot before version 2.3.4.1-1 is vulnerable to
authentication bypass.

Resolution

Upgrade to 2.3.4.1-1.

pacman -Syu “dovecot>=2.3.4.1-1”

The problem has been fixed upstream in version 2.3.4.1.

Workaround

None.

Description

A vulnerability has been found in Dovecot versions prior to 2.3.4.1,
allowing a remote client in possession of a trusted SSL certificate to
log in as any user, in some configurations.
This affects only installations using auth_ssl_require_client_cert =
yes and auth_ssl_username_from_cert = yes, and the the attacker might
have access to a trusted certificate without the
ssl_cert_username_field (default to commonName) set in it.

Impact

A remote client in possession of a trusted SSL certificate might be
able to log in as any user.

References

https://www.dovecot.org/pipermail/dovecot/2019-February/114575.html
https://github.com/dovecot/core/commit/61471a5c42528090cffcca9bceded316746637b7
https://security.archlinux.org/CVE-2019-3814

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanydovecot< 2.3.4.1-1UNKNOWN

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N

4.9 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

0.002 Low

EPSS

Percentile

62.1%