First published: Tue May 27 2014(Updated: )
The IMAP functionality in Dovecot before 2.2.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via invalid APPEND parameters.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dovecot | <=2.2.1 | |
Dovecot | =2.2-rc1 | |
Dovecot | =2.2-rc2 | |
Dovecot | =2.2-rc3 | |
Dovecot | =2.2-rc4 | |
Dovecot | =2.2-rc5 | |
Dovecot | =2.2-rc6 | |
Dovecot | =2.2-rc7 | |
Dovecot | =2.2.0 | |
<=2.2.1 | ||
=2.2-rc1 | ||
=2.2-rc2 | ||
=2.2-rc3 | ||
=2.2-rc4 | ||
=2.2-rc5 | ||
=2.2-rc6 | ||
=2.2-rc7 | ||
=2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2111 has been classified with a severity that indicates it can lead to denial of service due to CPU exhaustion.
To fix CVE-2013-2111, upgrade Dovecot to version 2.2.2 or later.
CVE-2013-2111 affects Dovecot versions up to and including 2.2.1 and all release candidates of version 2.2.
CVE-2013-2111 is exploited via remote attackers sending invalid APPEND parameters to the IMAP functionality.
Failure to address CVE-2013-2111 could result in service disruption and increased CPU consumption on the affected Dovecot servers.