Description
Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially crafted %variable fields could result in excessive memory usage causing the process to crash (and restart), or excessive CPU usage causing all authentications to hang.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3828-1 | dovecot security update |
EUVD |
EUVD-2017-11814 | Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially crafted %variable fields could result in excessive memory usage causing the process to crash (and restart), or excessive CPU usage causing all authentications to hang. |
Ubuntu USN |
USN-3258-1 | Dovecot vulnerability |
Ubuntu USN |
USN-3258-2 | Dovecot regression |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T14:02:06.877Z
Reserved: 2016-12-01T00:00:00.000Z
Link: CVE-2017-2669
No data.
Status : Modified
Published: 2018-06-21T13:29:00.317
Modified: 2024-11-21T03:23:56.570
Link: CVE-2017-2669
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN