First published: Wed Oct 06 2010(Updated: )
plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dovecot | =1.2.0 | |
Dovecot | =1.2.1 | |
Dovecot | =1.2.2 | |
Dovecot | =1.2.3 | |
Dovecot | =1.2.4 | |
Dovecot | =1.2.5 | |
Dovecot | =1.2.6 | |
Dovecot | =1.2.7 | |
Dovecot | =1.2.8 | |
Dovecot | =1.2.9 | |
Dovecot | =1.2.10 | |
Dovecot | =1.2.11 | |
Dovecot | =1.2.12 | |
Dovecot | =1.2.13 | |
Dovecot | =1.2.14 | |
Dovecot | =2.0.0 | |
Dovecot | =2.0.1 | |
Dovecot | =2.0.2 | |
Dovecot | =2.0.3 | |
Dovecot | =2.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3707 has been classified with a medium severity rating.
To mitigate CVE-2010-3707, upgrade Dovecot to version 1.2.15 or 2.0.5 or later.
CVE-2010-3707 affects Dovecot versions 1.2.0 through 1.2.14 and 2.0.0 through 2.0.4.
CVE-2010-3707 is an access control vulnerability that can lead to improperly granted permissions.
There are no known workarounds for CVE-2010-3707, so upgrading is the recommended course of action.