Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 10 Mar 2008 14:48:13 -0800
From: Jonathan Smith <smithj@...ethemallocs.com>
To:  oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...re.org>
Subject: Re: CVE request: dovecot unauthorized login

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Steven M. Christey wrote:
| I wrote this up as 1.0.x instead of 1.0.11 (skip_password_check's
| introduction) since (perhaps) other fields could be inserted to do
| something bad.
|
| ======================================================
| Name: CVE-2008-1271
| Status: Candidate
| URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1271
| Reference: MLIST:[Dovecot-news] 20080309 v1.0.13 and v1.1.rc3 released
| Reference:
URL:http://www.dovecot.org/list/dovecot-news/2008-March/000065.html
| Reference: MLIST:[Dovecot-news] 20080309 Security hole #6: Some
passdbs allowed users to log in without a valid password
| Reference:
URL:http://www.dovecot.org/list/dovecot-news/2008-March/000064.html
|
| Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and
| 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote
| attackers to bypass the password check via a password containing TAB
| characters, which are treated as argument delimiters that enable the
| skip_password_check field to be specified.

So, we shouldn't be using CVE-2008-1218 for this (as you indicated
yesterday)?

	smithj

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.8 (GNU/Linux)

iEYEARECAAYFAkfVuq0ACgkQCG91qXPaRemotgCgjfcW95noV7SulDu5UJHV0God
xc4An2Z0lNVzyqZseVrQcO0ShNfsdiNw
=KogG
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.