Lucene search

K
ubuntuUbuntuUSN-4993-1
HistoryJun 21, 2021 - 12:00 a.m.

Dovecot vulnerabilities

2021-06-2100:00:00
ubuntu.com
95

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N

AI Score

6.1

Confidence

High

EPSS

0.004

Percentile

72.3%

Releases

  • Ubuntu 21.04
  • Ubuntu 20.10
  • Ubuntu 20.04 LTS

Packages

  • dovecot - IMAP and POP3 email server

Details

Kirin discovered that Dovecot incorrectly escaped kid and azp fields in JWT
tokens. A local attacker could possibly use this issue to validate tokens
using arbitrary keys. This issue only affected Ubuntu 20.10 and Ubuntu
21.04. (CVE-2021-29157)

Fabian Ising and Damian Poddebniak discovered that Dovecot incorrectly
handled STARTTLS when using the SMTP submission service. A remote attacker
could possibly use this issue to inject plaintext commands before
STARTTLS negotiation. (CVE-2021-33515)

OSVersionArchitecturePackageVersionFilename
Ubuntu21.04noarchdovecot-core< 1:2.3.13+dfsg1-1ubuntu1.1UNKNOWN
Ubuntu21.04noarchdovecot-auth-lua< 1:2.3.13+dfsg1-1ubuntu1.1UNKNOWN
Ubuntu21.04noarchdovecot-auth-lua-dbgsym< 1:2.3.13+dfsg1-1ubuntu1.1UNKNOWN
Ubuntu21.04noarchdovecot-core-dbgsym< 1:2.3.13+dfsg1-1ubuntu1.1UNKNOWN
Ubuntu21.04noarchdovecot-dev< 1:2.3.13+dfsg1-1ubuntu1.1UNKNOWN
Ubuntu21.04noarchdovecot-gssapi< 1:2.3.13+dfsg1-1ubuntu1.1UNKNOWN
Ubuntu21.04noarchdovecot-gssapi-dbgsym< 1:2.3.13+dfsg1-1ubuntu1.1UNKNOWN
Ubuntu21.04noarchdovecot-imapd< 1:2.3.13+dfsg1-1ubuntu1.1UNKNOWN
Ubuntu21.04noarchdovecot-imapd-dbgsym< 1:2.3.13+dfsg1-1ubuntu1.1UNKNOWN
Ubuntu21.04noarchdovecot-ldap< 1:2.3.13+dfsg1-1ubuntu1.1UNKNOWN
Rows per page:
1-10 of 941

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N

AI Score

6.1

Confidence

High

EPSS

0.004

Percentile

72.3%