First published: Fri Sep 24 2010(Updated: )
The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dovecot | =1.2.0 | |
Dovecot | =1.2.1 | |
Dovecot | =1.2.2 | |
Dovecot | =1.2.3 | |
Dovecot | =1.2.4 | |
Dovecot | =1.2.5 | |
Dovecot | =1.2.6 | |
Dovecot | =1.2.7 | |
Dovecot | =1.2.8 | |
Dovecot | =1.2.9 | |
Dovecot | =1.2.10 | |
Dovecot | =1.2.11 | |
Dovecot | =1.2.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3304 is classified as a medium severity vulnerability due to its potential to allow unauthorized access to mailboxes.
To fix CVE-2010-3304, upgrade Dovecot to version 1.2.13 or later, which addresses the ACL propagation issue.
CVE-2010-3304 affects Dovecot versions 1.2.0 to 1.2.12.
CVE-2010-3304 allows unauthorized access by propagating weak ACL settings from the INBOX to newly created mailboxes.
The impact of CVE-2010-3304 is that it may enable remote attackers to read emails in mailboxes that have unintended weak ACLs.