First published: Tue Apr 28 2015(Updated: )
A flaw was found in the way Dovecot handled SSL handshake failures. A remote attacker could use this flaw to crash the imap-login and pop3-login processes. Note that only Dovecot installations accepting SSL/TLS connections that have SSLv3 disabled are vulnerable. Additional details: <a href="http://dovecot.org/pipermail/dovecot/2015-April/100618.html">http://dovecot.org/pipermail/dovecot/2015-April/100618.html</a> <a href="http://seclists.org/oss-sec/2015/q2/288">http://seclists.org/oss-sec/2015/q2/288</a> Upstream patch: <a href="http://hg.dovecot.org/dovecot-2.2/rev/86f535375750">http://hg.dovecot.org/dovecot-2.2/rev/86f535375750</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dovecot | <2.2.17 | 2.2.17 |
Dovecot Dovecot | <=2.2.16 | |
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =21 | |
Fedoraproject Fedora | =22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.