First published: Mon Jan 08 2018(Updated: )
A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dovecot Dovecot | <2.2.34 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
redhat/dovecot | <2.2.34 | 2.2.34 |
redhat/dovecot | <2.3.1 | 2.3.1 |
debian/dovecot | 1:2.3.13+dfsg1-2+deb11u1 1:2.3.13+dfsg1-2+deb11u2 1:2.3.19.1+dfsg1-2.1+deb12u1 1:2.3.21.1+dfsg1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15130 is a denial of service vulnerability found in dovecot before version 2.2.34.
The severity of CVE-2017-15130 is high, with a CVSS score of 5.9.
CVE-2017-15130 allows an attacker to generate random SNI server names and exploit TLS SNI configuration lookups, leading to excessive memory usage and process restart.
CVE-2017-15130 affects dovecot versions before 2.2.34.
To fix CVE-2017-15130, upgrade to dovecot version 2.2.34 or higher.