7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.037 Low
EPSS
Percentile
91.7%
Severity: High
Date : 2021-01-04
CVE-ID : CVE-2020-24386 CVE-2020-25275
Package : dovecot
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1398
The package dovecot before version 2.3.13-1 is vulnerable to multiple
issues including information disclosure and denial of service.
Upgrade to 2.3.13-1.
The problems have been fixed upstream in version 2.3.13.
Operators can choose to disable IMAP hibernation. IMAP hibernation is
not on by default. To ensure imap hibernation is disabled, make sure
imap_hibernate_timeout is set to 0 or unset.
A security issue was discovered in dovecot version 2.2.26 up to
2.3.11.3. When imap hibernation is active, an attacker can cause
dovecot to discover the file system directory structure and access
other users’ emails using a specially crafted command. The attacker
must have valid credentials to access the mail server. The issue is
fixed in dovecot version 2.3.13.
A security issue was discovered in dovecot version 2.3.11 up to
2.3.11.3. Mail delivery/parsing crashed when the 10 000th MIME part was
message/rfc822 (or if its parent was multipart/digest). This happened
due to earlier MIME parsing changes for CVE-2020-12100. Malicious
senders could crash dovecot repeatedly by sending/uploading messages
with more than 10 000 MIME parts. The issue is fixed in dovecot version
2.3.13.
Malicious senders could crash dovecot repeatedly by sending/uploading
messages with more than 10 000 MIME parts.
In addition, when imap hibernation is active, a remote, authenticated
attacker can cause dovecot to discover the file system directory
structure and access other users’ emails using a specially crafted
command.
https://dovecot.org/pipermail/dovecot-news/2021-January/000450.html
https://github.com/dovecot/core/commit/00df2308b0733e810824545183d73276c416cdd3
https://github.com/dovecot/core/commit/b4a9872b833b7985c7d0e7615f1b7fc812dd4c55
https://dovecot.org/pipermail/dovecot-news/2021-January/000451.html
https://github.com/dovecot/core/commit/67f792cb98267ee74c425772e766e7a2525c0d8f
https://github.com/dovecot/core/commit/6ae93c3936fc870c313a6fdf44a0999d4129d9b8
https://security.archlinux.org/CVE-2020-24386
https://security.archlinux.org/CVE-2020-25275
dovecot.org/pipermail/dovecot-news/2021-January/000450.html
dovecot.org/pipermail/dovecot-news/2021-January/000451.html
github.com/dovecot/core/commit/00df2308b0733e810824545183d73276c416cdd3
github.com/dovecot/core/commit/67f792cb98267ee74c425772e766e7a2525c0d8f
github.com/dovecot/core/commit/6ae93c3936fc870c313a6fdf44a0999d4129d9b8
github.com/dovecot/core/commit/b4a9872b833b7985c7d0e7615f1b7fc812dd4c55
security.archlinux.org/AVG-1398
security.archlinux.org/CVE-2020-24386
security.archlinux.org/CVE-2020-25275
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.037 Low
EPSS
Percentile
91.7%