Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <50BECD9D.2040706@redhat.com>
Date: Tue, 04 Dec 2012 21:29:17 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Vincent Danen <vdanen@...hat.com>, Moritz Muehlenhoff <jmm@...ian.org>,
        Steven Christey <coley@...re.org>
Subject: Re: CVE request: Dovecot DoS in 2.x (fixed in 2.1.11)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 12/04/2012 03:48 PM, Vincent Danen wrote:
> * [2012-12-04 23:01:42 +0100] Moritz Muehlenhoff wrote:
> 
>> On Tue, Dec 04, 2012 at 06:12:29PM +0100, Matthias Weckbecker
>> wrote:
>>> Hi Kurt, Vincent, vendors, ...
>>> 
>>> Quoting Kurt Seifried <kseifried@...hat.com>:
>>>> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
>>>> 
>>>> On 12/03/2012 10:33 AM, Vincent Danen wrote:
>>>>> Could a CVE be assigned for the following please?
>>>>> 
>>>>> Dovecot 2.1.11 was released and includes a fix for a crash 
>>>>> condition when the IMAP server was issued a SEARCH command
>>>>> with multiple KEYWORD parameters.  An authenticated remote
>>>>> user could use this flaw to crash Dovecot.
>>>>> 
>>> [...]
>>>>> 
>>>>> 
>>>>> Thanks.
>>>> 
>>>> Please use CVE-2012-5620 for this issue.
>>>> 
>>> 
>>> We were discussing this issue too at [1] and think that it does
>>> only affect the current connection, no subsequent (i.e. new)
>>> connections are affected.
>>> 
>>> What's your opinion wrt this?
>>> 
>>> [1] https://bugzilla.novell.com/show_bug.cgi?id=792642
>> 
>> Upstream (Timo Sirainen) disputed the issue in the Debian BTS: 
>> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695138#15
> 
> Ahhh... yes, Timo is correct.  If you're only DoS'ing your own 
> connection, I wouldn't consider this a flaw.
> 
> I (mistakenly) thought this took down the entire dovecot server.
> My apologies.
> 
> Can we have this CVE rejected or disputed?  As Timo says, it's a 
> pointless CVE.
> 
> Thanks, and sorry about that.
> 

Please REJECT CVE-2012-5620, this only affects the users session and
thus no security boundary is crossed (users can of course always close
their own session, and there is no way to trigger the client to do
this remotely).

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=XLuU
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.