openSUSE Security Update : dovecot23 (openSUSE-2021-72)

medium Nessus Plugin ID 145396

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for dovecot23 fixes the following issues :

Security issues fixed :

- CVE-2020-12100: Fixed a resource exhaustion caused by deeply nested MIME parts (bsc#1174920).

- CVE-2020-24386: Fixed an issue with IMAP hibernation that allowed users to access other users' emails (bsc#1180405).

- CVE-2020-25275: Fixed a crash when the 10000th MIME part was message/rfc822 (bsc#1180406).

Non-security issues fixed :

- Pigeonhole was updated to version 0.5.11.

- Dovecot was updated to version 2.3.11.3.

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Solution

Update the affected dovecot23 packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1174920

https://bugzilla.opensuse.org/show_bug.cgi?id=1180405

https://bugzilla.opensuse.org/show_bug.cgi?id=1180406

Plugin Details

Severity: Medium

ID: 145396

File Name: openSUSE-2021-72.nasl

Version: 1.3

Type: local

Agent: unix

Published: 1/25/2021

Updated: 1/26/2024

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:N

CVSS Score Source: CVE-2020-24386

CVSS v3

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 6.1

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:dovecot23, p-cpe:/a:novell:opensuse:dovecot23-backend-mysql, p-cpe:/a:novell:opensuse:dovecot23-backend-mysql-debuginfo, p-cpe:/a:novell:opensuse:dovecot23-backend-pgsql, p-cpe:/a:novell:opensuse:dovecot23-backend-pgsql-debuginfo, p-cpe:/a:novell:opensuse:dovecot23-backend-sqlite, p-cpe:/a:novell:opensuse:dovecot23-backend-sqlite-debuginfo, p-cpe:/a:novell:opensuse:dovecot23-debuginfo, p-cpe:/a:novell:opensuse:dovecot23-debugsource, p-cpe:/a:novell:opensuse:dovecot23-devel, p-cpe:/a:novell:opensuse:dovecot23-fts, p-cpe:/a:novell:opensuse:dovecot23-fts-debuginfo, p-cpe:/a:novell:opensuse:dovecot23-fts-lucene, p-cpe:/a:novell:opensuse:dovecot23-fts-lucene-debuginfo, p-cpe:/a:novell:opensuse:dovecot23-fts-solr, p-cpe:/a:novell:opensuse:dovecot23-fts-solr-debuginfo, p-cpe:/a:novell:opensuse:dovecot23-fts-squat, p-cpe:/a:novell:opensuse:dovecot23-fts-squat-debuginfo, cpe:/o:novell:opensuse:15.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/16/2021

Vulnerability Publication Date: 8/12/2020

Reference Information

CVE: CVE-2020-12100, CVE-2020-24386, CVE-2020-25275