First published: Mon Jun 13 2016(Updated: )
A postinstall script in the dovecot rpm allows local users to read the contents of newly created SSL/TLS key files.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dovecot | ||
SUSE Linux | =42.1 | |
SUSE Linux | =42.2 | |
openSUSE | =13.2 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4983 has a medium severity rating, as it allows local users to access sensitive SSL/TLS key files.
Mitigation for CVE-2016-4983 involves adjusting file permissions and ownership for SSL/TLS key files created by dovecot.
CVE-2016-4983 affects certain versions of Dovecot on Red Hat Enterprise Linux and openSUSE distributions.
Yes, exploiting CVE-2016-4983 can allow local users to read private SSL/TLS key files, potentially leading to unauthorized access.
CVE-2016-4983 impacts Red Hat Enterprise Linux versions 4.0, 5.0, 6.0, and 7.0.