[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1NEoJU-0004aI-P5@titan.mandriva.com>
Date: Sun, 29 Nov 2009 19:16:00 +0100
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2009:306 ] dovecot
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:306
http://www.mandriva.com/security/
_______________________________________________________________________
Package : dovecot
Date : November 29, 2009
Affected: 2010.0
_______________________________________________________________________
Problem Description:
A vulnerability was discovered and corrected in dovecot:
Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of
certain directories at installation time, which allows local users to
access arbitrary user accounts by replacing the auth socket, related
to the parent directories of the base_dir directory, and possibly
the base_dir directory itself (CVE-2009-3897).
The updated packages have been patched to correct these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3897
http://www.dovecot.org/list/dovecot-news/2009-November/000143.html
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2010.0:
d0764e505f706064fa6803bfbf2dc2da 2010.0/i586/dovecot-1.2.6-1.1mdv2010.0.i586.rpm
347393ff0a11bb9b4292422aaa3384ed 2010.0/i586/dovecot-devel-1.2.6-1.1mdv2010.0.i586.rpm
9d47e0d57dd0c48579bff14bbb370f6f 2010.0/i586/dovecot-plugins-gssapi-1.2.6-1.1mdv2010.0.i586.rpm
64dee1669ad6349d2716adceb1bc4cb0 2010.0/i586/dovecot-plugins-ldap-1.2.6-1.1mdv2010.0.i586.rpm
01d66bedd09be43518c3434bb3b2ca60 2010.0/i586/dovecot-plugins-managesieve-1.2.6-1.1mdv2010.0.i586.rpm
23167551a2233c73b3fbe4a00fe6b91c 2010.0/i586/dovecot-plugins-mysql-1.2.6-1.1mdv2010.0.i586.rpm
cd51dbfd87298d7c7f78d77fb7f1a0d4 2010.0/i586/dovecot-plugins-pgsql-1.2.6-1.1mdv2010.0.i586.rpm
7a3116333058345794ee217636900afb 2010.0/i586/dovecot-plugins-sieve-1.2.6-1.1mdv2010.0.i586.rpm
27c9947524ce85ddd433e5e4e886f12e 2010.0/i586/dovecot-plugins-sqlite-1.2.6-1.1mdv2010.0.i586.rpm
e1da0dc466433780dc0d502fbf5ab7bd 2010.0/SRPMS/dovecot-1.2.6-1.1mdv2010.0.src.rpm
Mandriva Linux 2010.0/X86_64:
9c163a5bd8fea0f3b25ddc13b5b4f8e3 2010.0/x86_64/dovecot-1.2.6-1.1mdv2010.0.x86_64.rpm
10fcc7bef63f7d03bd86fa3dc2241ca0 2010.0/x86_64/dovecot-devel-1.2.6-1.1mdv2010.0.x86_64.rpm
b495c315980234f71cac5dcc65d29f0b 2010.0/x86_64/dovecot-plugins-gssapi-1.2.6-1.1mdv2010.0.x86_64.rpm
3a642f33ef442b0f5037ffa4b218d82c 2010.0/x86_64/dovecot-plugins-ldap-1.2.6-1.1mdv2010.0.x86_64.rpm
8639b1f5ec59b5321b667d932d86a59a 2010.0/x86_64/dovecot-plugins-managesieve-1.2.6-1.1mdv2010.0.x86_64.rpm
e705e9fb22327b3126f3f3a87c1da11e 2010.0/x86_64/dovecot-plugins-mysql-1.2.6-1.1mdv2010.0.x86_64.rpm
56e1158fc7531a6bcc62ca9c37246152 2010.0/x86_64/dovecot-plugins-pgsql-1.2.6-1.1mdv2010.0.x86_64.rpm
39e72fa61ce3d32cd9e8a564ac201a69 2010.0/x86_64/dovecot-plugins-sieve-1.2.6-1.1mdv2010.0.x86_64.rpm
a4ccb1389c9f47c059f8155de79942a4 2010.0/x86_64/dovecot-plugins-sqlite-1.2.6-1.1mdv2010.0.x86_64.rpm
e1da0dc466433780dc0d502fbf5ab7bd 2010.0/SRPMS/dovecot-1.2.6-1.1mdv2010.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFLEpArmqjQ0CJFipgRAh7PAJ0SEs59M4B+GfUXqBvdqNsDOrTKoACg4KqJ
HJrTQRc4LVGhWNXc5+cAyIM=
=G4NY
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists