Dovecot Multiple Command Traversal Arbitrary Directory Listing

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote IMAP server is affected by a directory traversal
vulnerability.

Description :

The remote host is running Dovecot, an open source IMAP4 / POP3 server
for Linux / Unix.

The version of Dovecot installed on the remote host fails to filter
directory traversal sequences from user-supplied input to IMAP
commands such as LIST and DELETE. An authenticated attacker may be
able to leverage this issue to list directories and files in the mbox
root's parent directory or possibly to delete index files used by the
application.

See also :

http://www.securityfocus.com/archive/1/archive/1/433878/100/0/threaded
http://www.dovecot.org/list/dovecot/2006-May/013385.html

Solution :

Upgrade to Dovecot version 1.0 beta8 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 21559 (dovecot_dir_traversal.nasl)

Bugtraq ID: 17961

CVE ID: CVE-2006-2414