Dovecot passdbs Argument Injection Authentication Bypass

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote mail server is affected by an authentication bypass
vulnerability.

Description :

The remote host is running Dovecot, an open source IMAP4 / POP3 server
for Linux / Unix.

The version of Dovecot installed on the remote host uses a TAB
character as a delimiter internally but fails to escape them when they
appear in a password. Provided Dovecot is configured to use a
blocking passdb, an attacker can leverage this issue to bypass
authentication and gain access to a user's mailbox.

See also :

http://www.dovecot.org/list/dovecot-news/2008-March/000064.html

Solution :

Upgrade to Dovecot v1.0.13 / v1.1.rc3 or later.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 4.8
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 31466 (dovecot_auth_bypass.nasl)

Bugtraq ID: 28181

CVE ID: CVE-2008-1218