A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1333-1 | dovecot security update |
Debian DSA |
DSA-4130-1 | dovecot security update |
EUVD |
EUVD-2017-6593 | A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion. |
Ubuntu USN |
USN-3556-1 | Dovecot vulnerability |
Ubuntu USN |
USN-3556-2 | Dovecot vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-17T00:36:33.953Z
Reserved: 2017-10-08T00:00:00
Link: CVE-2017-15132
No data.
Status : Modified
Published: 2018-01-25T20:29:00.213
Modified: 2024-11-21T03:14:08.107
Link: CVE-2017-15132
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN