Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially crafted %variable fields could result in excessive memory usage causing the process to crash (and restart), or excessive CPU usage causing all authentications to hang.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-3828-1 dovecot security update
EUVD EUVD EUVD-2017-11814 Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially crafted %variable fields could result in excessive memory usage causing the process to crash (and restart), or excessive CPU usage causing all authentications to hang.
Ubuntu USN Ubuntu USN USN-3258-1 Dovecot vulnerability
Ubuntu USN Ubuntu USN USN-3258-2 Dovecot regression
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T14:02:06.877Z

Reserved: 2016-12-01T00:00:00

Link: CVE-2017-2669

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-21T13:29:00.317

Modified: 2024-11-21T03:23:56.570

Link: CVE-2017-2669

cve-icon Redhat

Severity : Low

Publid Date: 2017-04-10T00:00:00Z

Links: CVE-2017-2669 - Bugzilla

cve-icon OpenCVE Enrichment

No data.