CVE-2011-1929

lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
References
Link Resource
http://dovecot.org/pipermail/dovecot/2011-May/059085.html Patch
http://dovecot.org/pipermail/dovecot/2011-May/059086.html Patch
http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html
http://openwall.com/lists/oss-security/2011/05/18/4 Patch
http://openwall.com/lists/oss-security/2011/05/19/3 Patch
http://openwall.com/lists/oss-security/2011/05/19/6 Patch
http://osvdb.org/72495
http://secunia.com/advisories/44683
http://secunia.com/advisories/44712
http://secunia.com/advisories/44756
http://secunia.com/advisories/44771
http://secunia.com/advisories/44827
http://www.debian.org/security/2011/dsa-2252
http://www.dovecot.org/doc/NEWS-1.2
http://www.dovecot.org/doc/NEWS-2.0
http://www.mandriva.com/security/advisories?name=MDVSA-2011:101
http://www.redhat.com/support/errata/RHSA-2011-1187.html
http://www.securityfocus.com/bid/47930
http://www.ubuntu.com/usn/USN-1143-1
https://bugzilla.redhat.com/show_bug.cgi?id=706286 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/67589
https://hermes.opensuse.org/messages/8581790
http://dovecot.org/pipermail/dovecot/2011-May/059085.html Patch
http://dovecot.org/pipermail/dovecot/2011-May/059086.html Patch
http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html
http://openwall.com/lists/oss-security/2011/05/18/4 Patch
http://openwall.com/lists/oss-security/2011/05/19/3 Patch
http://openwall.com/lists/oss-security/2011/05/19/6 Patch
http://osvdb.org/72495
http://secunia.com/advisories/44683
http://secunia.com/advisories/44712
http://secunia.com/advisories/44756
http://secunia.com/advisories/44771
http://secunia.com/advisories/44827
http://www.debian.org/security/2011/dsa-2252
http://www.dovecot.org/doc/NEWS-1.2
http://www.dovecot.org/doc/NEWS-2.0
http://www.mandriva.com/security/advisories?name=MDVSA-2011:101
http://www.redhat.com/support/errata/RHSA-2011-1187.html
http://www.securityfocus.com/bid/47930
http://www.ubuntu.com/usn/USN-1143-1
https://bugzilla.redhat.com/show_bug.cgi?id=706286 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/67589
https://hermes.opensuse.org/messages/8581790
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dovecot:dovecot:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.15:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:1.2.16:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:dovecot:dovecot:2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:dovecot:dovecot:2.0.12:*:*:*:*:*:*:*

History

21 Nov 2024, 01:27

Type Values Removed Values Added
References () http://dovecot.org/pipermail/dovecot/2011-May/059085.html - Patch () http://dovecot.org/pipermail/dovecot/2011-May/059085.html - Patch
References () http://dovecot.org/pipermail/dovecot/2011-May/059086.html - Patch () http://dovecot.org/pipermail/dovecot/2011-May/059086.html - Patch
References () http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c - Patch () http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c - Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html -
References () http://openwall.com/lists/oss-security/2011/05/18/4 - Patch () http://openwall.com/lists/oss-security/2011/05/18/4 - Patch
References () http://openwall.com/lists/oss-security/2011/05/19/3 - Patch () http://openwall.com/lists/oss-security/2011/05/19/3 - Patch
References () http://openwall.com/lists/oss-security/2011/05/19/6 - Patch () http://openwall.com/lists/oss-security/2011/05/19/6 - Patch
References () http://osvdb.org/72495 - () http://osvdb.org/72495 -
References () http://secunia.com/advisories/44683 - () http://secunia.com/advisories/44683 -
References () http://secunia.com/advisories/44712 - () http://secunia.com/advisories/44712 -
References () http://secunia.com/advisories/44756 - () http://secunia.com/advisories/44756 -
References () http://secunia.com/advisories/44771 - () http://secunia.com/advisories/44771 -
References () http://secunia.com/advisories/44827 - () http://secunia.com/advisories/44827 -
References () http://www.debian.org/security/2011/dsa-2252 - () http://www.debian.org/security/2011/dsa-2252 -
References () http://www.dovecot.org/doc/NEWS-1.2 - () http://www.dovecot.org/doc/NEWS-1.2 -
References () http://www.dovecot.org/doc/NEWS-2.0 - () http://www.dovecot.org/doc/NEWS-2.0 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:101 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:101 -
References () http://www.redhat.com/support/errata/RHSA-2011-1187.html - () http://www.redhat.com/support/errata/RHSA-2011-1187.html -
References () http://www.securityfocus.com/bid/47930 - () http://www.securityfocus.com/bid/47930 -
References () http://www.ubuntu.com/usn/USN-1143-1 - () http://www.ubuntu.com/usn/USN-1143-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=706286 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=706286 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/67589 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/67589 -
References () https://hermes.opensuse.org/messages/8581790 - () https://hermes.opensuse.org/messages/8581790 -

Information

Published : 2011-05-24 23:55

Updated : 2024-11-21 01:27


NVD link : CVE-2011-1929

Mitre link : CVE-2011-1929

CVE.ORG link : CVE-2011-1929


JSON object : View

Products Affected

dovecot

  • dovecot
CWE
CWE-20

Improper Input Validation