svn commit: r497014 - head/security/vuxml
Larry Rosenman
ler at FreeBSD.org
Thu Mar 28 12:21:38 UTC 2019
Author: ler
Date: Thu Mar 28 12:21:36 2019
New Revision: 497014
URL: https://svnweb.freebsd.org/changeset/ports/497014
Log:
vuxml: Document mail/dovecot buffer overflow.
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Mar 28 11:41:08 2019 (r497013)
+++ head/security/vuxml/vuln.xml Thu Mar 28 12:21:36 2019 (r497014)
@@ -58,6 +58,51 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="7862213c-5152-11e9-8b26-a4badb296695">
+ <topic>dovecot -- Buffer overflow reading extension header</topic>
+ <affects>
+ <package>
+ <name>dovecot</name>
+ <range><lt>2.3.5.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Aki Tuomi reports:</p>
+ <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-7524">
+ <p>Vulnerability Details:
+When reading FTS or POP3-UIDL header from dovecot index, the input
+buffer size is not bound, and data is copied to target structure causing
+stack overflow.
+
+Risk:
+This can be used for local root privilege escalation or executing
+arbitrary code in dovecot process context. This requires ability to
+directly modify dovecot indexes.
+Steps to reproduce:
+Produce dovecot.index.log entry that creates an FTS header which has
+more than 12 bytes of data.
+Trigger dovecot indexer-worker or run doveadm index.
+Dovecot will crash.
+
+Mitigations:
+Since 2.3.0 dovecot has been compiled with stack smash protection, ASLR,
+read-only GOT tables and other techniques that make exploiting this bug
+much harder.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-7524</url>
+ <url>https://dovecot.org/list/dovecot-news/2019-March/000401.html</url>
+ <cvename>CVE-2019-7524</cvename>
+ </references>
+ <dates>
+ <discovery>2019-02-05</discovery>
+ <entry>2019-03-28</entry>
+ </dates>
+ </vuln>
+
<vuln vid="94d63fd7-508b-11e9-9ba0-4c72b94353b5">
<topic>drupal -- Drupal core - Moderately critical - Cross Site Scripting</topic>
<affects>
More information about the svn-ports-head
mailing list