5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.5 High
AI Score
Confidence
High
0.036 Low
EPSS
Percentile
91.7%
Debian Security Advisory DSA-4745-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
August 12, 2020 https://www.debian.org/security/faq
Package : dovecot
CVE ID : CVE-2020-12100 CVE-2020-12673 CVE-2020-12674
Several vulnerabilities have been discovered in the Dovecot email
server.
CVE-2020-12100
Receiving mail with deeply nested MIME parts leads to resource
exhaustion as Dovecot attempts to parse it.
CVE-2020-12673
Dovecot's NTLM implementation does not correctly check message
buffer size, which leads to a crash when reading past allocation.
CVE-2020-12674
Dovecot's RPA mechanism implementation accepts zero-length message,
which leads to assert-crash later on.
For the stable distribution (buster), these problems have been fixed in
version 1:2.3.4.1-5+deb10u3.
We recommend that you upgrade your dovecot packages.
For the detailed security status of dovecot please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/dovecot
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | amd64 | dovecot-ldap | < 1:2.2.27-3+deb9u6 | dovecot-ldap_1:2.2.27-3+deb9u6_amd64.deb |
Debian | 10 | armel | dovecot-sqlite | < 1:2.3.4.1-5+deb10u3 | dovecot-sqlite_1:2.3.4.1-5+deb10u3_armel.deb |
Debian | 10 | i386 | dovecot-auth-lua | < 1:2.3.4.1-5+deb10u3 | dovecot-auth-lua_1:2.3.4.1-5+deb10u3_i386.deb |
Debian | 10 | s390x | dovecot-imapd-dbgsym | < 1:2.3.4.1-5+deb10u3 | dovecot-imapd-dbgsym_1:2.3.4.1-5+deb10u3_s390x.deb |
Debian | 10 | mips | dovecot-ldap-dbgsym | < 1:2.3.4.1-5+deb10u3 | dovecot-ldap-dbgsym_1:2.3.4.1-5+deb10u3_mips.deb |
Debian | 10 | i386 | dovecot-core-dbgsym | < 1:2.3.4.1-5+deb10u3 | dovecot-core-dbgsym_1:2.3.4.1-5+deb10u3_i386.deb |
Debian | 10 | mipsel | dovecot-mysql | < 1:2.3.4.1-5+deb10u3 | dovecot-mysql_1:2.3.4.1-5+deb10u3_mipsel.deb |
Debian | 9 | i386 | dovecot-core | < 1:2.2.27-3+deb9u6 | dovecot-core_1:2.2.27-3+deb9u6_i386.deb |
Debian | 10 | mips64el | dovecot-pgsql | < 1:2.3.4.1-5+deb10u3 | dovecot-pgsql_1:2.3.4.1-5+deb10u3_mips64el.deb |
Debian | 9 | i386 | dovecot-sieve | < 1:2.2.27-3+deb9u6 | dovecot-sieve_1:2.2.27-3+deb9u6_i386.deb |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.5 High
AI Score
Confidence
High
0.036 Low
EPSS
Percentile
91.7%