CVE-2010-3706

plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dovecot:dovecot:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.14:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:dovecot:dovecot:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:19

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html -
References () http://marc.info/?l=oss-security&m=128620520732377&w=2 - () http://marc.info/?l=oss-security&m=128620520732377&w=2 -
References () http://marc.info/?l=oss-security&m=128622064325688&w=2 - () http://marc.info/?l=oss-security&m=128622064325688&w=2 -
References () http://secunia.com/advisories/43220 - () http://secunia.com/advisories/43220 -
References () http://www.dovecot.org/list/dovecot/2010-October/053450.html - Vendor Advisory () http://www.dovecot.org/list/dovecot/2010-October/053450.html - Vendor Advisory
References () http://www.dovecot.org/list/dovecot/2010-October/053451.html - Vendor Advisory () http://www.dovecot.org/list/dovecot/2010-October/053451.html - Vendor Advisory
References () http://www.dovecot.org/list/dovecot/2010-October/053452.html - () http://www.dovecot.org/list/dovecot/2010-October/053452.html -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:217 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:217 -
References () http://www.ubuntu.com/usn/USN-1059-1 - () http://www.ubuntu.com/usn/USN-1059-1 -
References () http://www.vupen.com/english/advisories/2010/2572 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/2572 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/2840 - () http://www.vupen.com/english/advisories/2010/2840 -
References () http://www.vupen.com/english/advisories/2011/0301 - () http://www.vupen.com/english/advisories/2011/0301 -

Information

Published : 2010-10-06 17:00

Updated : 2024-11-21 01:19


NVD link : CVE-2010-3706

Mitre link : CVE-2010-3706

CVE.ORG link : CVE-2010-3706


JSON object : View

Products Affected

dovecot

  • dovecot
CWE
CWE-264

Permissions, Privileges, and Access Controls