First published: Tue May 24 2011(Updated: )
script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dovecot Dovecot | =2.0.9 | |
Dovecot Dovecot | =2.0.7 | |
Dovecot Dovecot | =2.0.12 | |
Dovecot Dovecot | =2.0.4 | |
Dovecot Dovecot | =2.0.2 | |
Dovecot Dovecot | =2.0.1 | |
Dovecot Dovecot | =2.0.10 | |
Dovecot Dovecot | =2.0.11 | |
Dovecot Dovecot | =2.0.8 | |
Dovecot Dovecot | =2.0.3 | |
Dovecot Dovecot | =2.0.0 | |
Dovecot Dovecot | =2.0.5 | |
Dovecot Dovecot | =2.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2167 is considered a moderate severity vulnerability due to its potential for directory traversal attacks.
To fix CVE-2011-2167, upgrade Dovecot to version 2.0.13 or later.
CVE-2011-2167 affects Dovecot versions 2.0.0 to 2.0.12.
CVE-2011-2167 allows remote authenticated users to conduct directory traversal attacks.
Yes, CVE-2011-2167 does not follow the chroot configuration setting, leading to potential security risks.