Bugzilla – Bug 1145559
VUL-0: CVE-2019-11500: dovecot22, dovecot23: IMAP and ManageSieve protocol parsers do not properly handle NUL byte
Last modified: 2019-11-13 12:32:08 UTC
now public through oss-sec Open-Xchange Security Advisory 2019-08-14 Product: Dovecot Vendor: OX Software GmbH Internal reference: DOV-3278 Vulnerability type: Improper input validation (CWE-20) Vulnerable version: All versions prior to 2.3.7.2 and 2.2.36.4 Vulnerable component: IMAP and ManageSieve protocol parsers (before and after login) Report confidence: Confirmed Solution status: Fixed by Vendor Fixed version: 2.3.7.2, 2.2.36.4 Researcher credits: Nick Roessler and Rafi Rubin, University of Pennsylvania Vendor notification: 2019-04-13 Solution date: 2019-06-05 Public disclosure: 2019-08-28 CVE reference: CVE-2019-11500 CVSS: 8.1 (CVSS3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) Vulnerability Details: IMAP and ManageSieve protocol parsers do not properly handle NUL byte when scanning data in quoted strings, leading to out of bounds heap memory writes. Risk: This vulnerability allows for out-of-bounds writes to objects stored on the heap up to 8096 bytes in pre-login phase, and 65536 bytes post-login phase, allowing sufficiently skilled attacker to perform complicated attacks that can lead to leaking private information or remote code execution. Abuse of this bug is very difficult to observe, as it does not necessarily cause a crash. Attempts to abuse this bug are not directly evident from logs. Steps to reproduce: This bug is best observed using valgrind to see the out of bounds read with following snippet: perl -e 'print "a id (\"foo\" \"".("x"x1021)."\\A\" \"bar\" \"\000".("x"x1020)."\\A\")\n"' | nc localhost 143 Solution: Operators should update to the latest Patch Release. There is no workaround for the issue.
This is an autogenerated message for OBS integration: This bug (1145559) was mentioned in https://build.opensuse.org/request/show/726988 Factory / dovecot23
tracking these codestreams as affected: - SUSE:SLE-12:Update - SUSE:SLE-15:Update - SUSE:SLE-15-SP1:Update
SUSE-SU-2019:2454-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1145559 CVE References: CVE-2019-11500 Sources used: SUSE OpenStack Cloud Crowbar 8 (src): dovecot22-2.2.31-19.17.1 SUSE OpenStack Cloud 8 (src): dovecot22-2.2.31-19.17.1 SUSE OpenStack Cloud 7 (src): dovecot22-2.2.31-19.17.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): dovecot22-2.2.31-19.17.1 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): dovecot22-2.2.31-19.17.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): dovecot22-2.2.31-19.17.1 SUSE Linux Enterprise Server for SAP 12-SP2 (src): dovecot22-2.2.31-19.17.1 SUSE Linux Enterprise Server for SAP 12-SP1 (src): dovecot22-2.2.31-19.17.1 SUSE Linux Enterprise Server 12-SP5 (src): dovecot22-2.2.31-19.17.1 SUSE Linux Enterprise Server 12-SP4 (src): dovecot22-2.2.31-19.17.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): dovecot22-2.2.31-19.17.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): dovecot22-2.2.31-19.17.1 SUSE Linux Enterprise Server 12-SP2-LTSS (src): dovecot22-2.2.31-19.17.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): dovecot22-2.2.31-19.17.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): dovecot22-2.2.31-19.17.1 SUSE Enterprise Storage 5 (src): dovecot22-2.2.31-19.17.1 SUSE Enterprise Storage 4 (src): dovecot22-2.2.31-19.17.1 HPE Helion Openstack 8 (src): dovecot22-2.2.31-19.17.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:2514-1: An update that fixes three vulnerabilities is now available. Category: security (important) Bug References: 1133624,1133625,1145559 CVE References: CVE-2019-11494,CVE-2019-11499,CVE-2019-11500 Sources used: SUSE Linux Enterprise Module for Server Applications 15-SP1 (src): dovecot23-2.3.3-8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2019:2278-1: An update that fixes three vulnerabilities is now available. Category: security (important) Bug References: 1133624,1133625,1145559 CVE References: CVE-2019-11494,CVE-2019-11499,CVE-2019-11500 Sources used: openSUSE Leap 15.0 (src): dovecot23-2.3.3-lp150.14.1
openSUSE-SU-2019:2281-1: An update that fixes three vulnerabilities is now available. Category: security (important) Bug References: 1133624,1133625,1145559 CVE References: CVE-2019-11494,CVE-2019-11499,CVE-2019-11500 Sources used: openSUSE Leap 15.1 (src): dovecot23-2.3.3-lp151.2.6.1
Updates are released.