7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.003 Low
EPSS
Percentile
70.0%
Debian Security Advisory DSA-4745-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
August 12, 2020 https://www.debian.org/security/faq
Package : dovecot
CVE ID : CVE-2020-12100 CVE-2020-12673 CVE-2020-12674
Several vulnerabilities have been discovered in the Dovecot email
server.
CVE-2020-12100
Receiving mail with deeply nested MIME parts leads to resource
exhaustion as Dovecot attempts to parse it.
CVE-2020-12673
Dovecot's NTLM implementation does not correctly check message
buffer size, which leads to a crash when reading past allocation.
CVE-2020-12674
Dovecot's RPA mechanism implementation accepts zero-length message,
which leads to assert-crash later on.
For the stable distribution (buster), these problems have been fixed in
version 1:2.3.4.1-5+deb10u3.
We recommend that you upgrade your dovecot packages.
For the detailed security status of dovecot please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/dovecot
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | all | dovecot-sieve | < 1:2.3.4.1-5+deb10u3 | dovecot-sieve_1:2.3.4.1-5+deb10u3_all.deb |
Debian | 10 | all | dovecot-sqlite | < 1:2.3.4.1-5+deb10u3 | dovecot-sqlite_1:2.3.4.1-5+deb10u3_all.deb |
Debian | 10 | all | dovecot-gssapi | < 1:2.3.4.1-5+deb10u3 | dovecot-gssapi_1:2.3.4.1-5+deb10u3_all.deb |
Debian | 10 | all | dovecot-imapd | < 1:2.3.4.1-5+deb10u3 | dovecot-imapd_1:2.3.4.1-5+deb10u3_all.deb |
Debian | 10 | all | dovecot-solr | < 1:2.3.4.1-5+deb10u3 | dovecot-solr_1:2.3.4.1-5+deb10u3_all.deb |
Debian | 10 | all | dovecot-pop3d | < 1:2.3.4.1-5+deb10u3 | dovecot-pop3d_1:2.3.4.1-5+deb10u3_all.deb |
Debian | 10 | all | dovecot-mysql | < 1:2.3.4.1-5+deb10u3 | dovecot-mysql_1:2.3.4.1-5+deb10u3_all.deb |
Debian | 10 | all | dovecot-dev | < 1:2.3.4.1-5+deb10u3 | dovecot-dev_1:2.3.4.1-5+deb10u3_all.deb |
Debian | 10 | all | dovecot-lucene | < 1:2.3.4.1-5+deb10u3 | dovecot-lucene_1:2.3.4.1-5+deb10u3_all.deb |
Debian | 10 | all | dovecot-lmtpd | < 1:2.3.4.1-5+deb10u3 | dovecot-lmtpd_1:2.3.4.1-5+deb10u3_all.deb |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.003 Low
EPSS
Percentile
70.0%