[dovecot] [CVE-2008-1199, CVE-2008-1218] privilege escalation
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
dovecot (Debian) |
Fix Released
|
Unknown
|
|||
dovecot (Ubuntu) |
Fix Released
|
Medium
|
Kees Cook | ||
Dapper |
Fix Released
|
Medium
|
Kees Cook | ||
Edgy |
Fix Released
|
Medium
|
Kees Cook | ||
Feisty |
Fix Released
|
Medium
|
Kees Cook | ||
Gutsy |
Fix Released
|
Medium
|
Kees Cook | ||
Hardy |
Fix Released
|
Medium
|
Kees Cook |
Bug Description
Binary package hint: dovecot
References:
DSA-1516-1 (http://
Quoting:
"Prior to this update, the default configuration for Dovecot used by
Debian runs the server daemons with group mail privileges. This means
that users with write access to their mail directory by other means
(for example, through an SSH login) could read mailboxes owned by
other users for which they do not have direct write access
(CVE-2008-1199). In addition, an internal interpretation conflict in
password handling has been addressed proactively, even though it is
not known to be exploitable (CVE-2008-1218).
Note that applying this update requires manual action: The
configuration setting "mail_extra_groups = mail" has been replaced
with "mail_privilege
configuration file conflict in /etc/dovecot/
recommended that you keep the currently installed configuration file,
and change the affected line. For your reference, the sample
configuration (without your local changes) will have been written to
/etc/dovecot/
If your current configuration uses mail_extra_groups with a value
different from "mail", you may have to resort to the
mail_access_groups configuration directive."
Changed in dovecot: | |
status: | Unknown → Fix Released |
Changed in dovecot: | |
importance: | Undecided → High |
Attaching debdiff