Lucene search

K
zdtPhilippe Antoine1337DAY-ID-34459
HistoryMay 18, 2020 - 12:00 a.m.

Open-Xchange Dovecot 2.3.10 Null Pointer Dereference / Denial Of Service Vulnerabilities

2020-05-1800:00:00
Philippe Antoine
0day.today
40

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.038 Low

EPSS

Percentile

91.7%

------------------

Open-Xchange Security Advisory 2020-05-18

Product: Dovecot
Vendor: OX Software GmbH

Internal reference: DOV-3784
Vulnerability type: NULL pointer dereference (CWE-476)
Vulnerable version: 2.3.0 - 2.3.10
Vulnerable component: submission, lmtp
Report confidence: Confirmed
Solution status: Fixed by Vendor
Fixed version: 2.3.10.1
Researcher credits: Philippe Antoine (Catena Cyber)
Vendor notification: 2020-03-24
Solution date: 2020-04-02
Public disclosure: 2020-05-18
CVE reference: CVE-2020-10957
CVSS: 7.5  (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Vulnerability Details:
  Sending malformed NOOP command causes crash in submission, submission-login or
  lmtp service.

Risk:
  Remote attacker can keep submission-login service down, causing denial of
  service attack. For lmtp the risk is neglible, as lmtp is usually behind a
  trusted MTA.

Steps to reproduce:
  Send ``NOOP EE"FY`` to submission port, or similarly malformed command.

Solution:
  Upgrade to fixed version.

------------------

Open-Xchange Security Advisory 2020-05-18

Product: Dovecot IMAP server
Vendor: OX Software GmbH

Internal reference: DOV-3875
Vulnerability type: Improper handling of input data (CWE-20)
Vulnerable version: 2.3.0 - 2.3.10
Vulnerable component: submission, lmtp
Report confidence: Confirmed
Solution status: Fixed by Vendor
Fixed version: 2.3.10.1
Researcher credits: Philippe Antoine (Catena Cyber)
Vendor notification: 2020-03-23
Solution date: 2020-04-02
Public disclosure: 2020-05-18
CVE reference: CVE-2020-10958
CVSS: 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Vulnerability Details:

  Sending command followed by sufficient number of newlines triggers a
  use-after-free bug that might crash submission-login, submission or
  lmtp service.

Risk:

  Remote attacker can keep submission-login service down, causing denial
  of service attack. For lmtp the risk is neglible, as lmtp is usually
  behind a trusted MTA.

Steps to reproduce:

  This can be currently reproduced with ASAN or Valgrind. Reliable way to
  crash has not yet been discovered.

Solution:

  Upgrade to fixed version.

------------------

Open-Xchange Security Advisory 2020-05-18

Product: Dovecot
Vendor: OX Software GmbH

Internal reference: DOV-1745
Vulnerability type: Improper input validation (CWE-20)
Vulnerable version: 2.3.0 - 2.3.10
Vulnerable component: submission, lmtp
Report confidence: Confirmed
Solution status: Fixed by Vendor
Fixed version: 2.3.10.1
Researcher credits: mailbox.org
Vendor notification: 2020-03-20
Solution date: 2020-04-02
Public disclosure: 2020-05-18
CVE reference: CVE-2020-10967
CVSS: 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Vulnerability Details:
  Sending mail with empty quoted localpart causes submission or lmtp component
  to crash.

Risk:
  Malicious actor can cause denial of service to mail delivery by repeatedly
  sending mails with bad sender or recipient address.

Steps to reproduce:
  Send mail with envelope sender or recipient as ``<""@example.org>``.

Workaround:
  For submission there is no workaround, but triggering the bug requires valid
  credentials.
  For lmtp, one can implement sufficient filtering on MTA level to prevent mails
  with such addresses from ending up in LMTP delivery.

Solution:
  Upgrade to fixed version.

------------------

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.038 Low

EPSS

Percentile

91.7%