First published: Wed Aug 14 2019(Updated: )
In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dovecot | <2.3.7.2 | 2.3.7.2 |
redhat/dovecot | <2.2.36.4 | 2.2.36.4 |
Dovecot Dovecot | <2.2.36.4 | |
Dovecot Dovecot | >=2.3.0<2.3.7.2 | |
Dovecot Pigeonhole | <0.5.7.2 | |
Debian Debian Linux | =8.0 | |
Fedoraproject Fedora | =30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11500 is a vulnerability in Dovecot and Pigeonhole that can lead to out-of-bounds writes and remote code execution.
CVE-2019-11500 has a severity rating of 9.8 (Critical).
CVE-2019-11500 affects Dovecot versions before 2.2.36.4 and 2.3.x before 2.3.7.2, and Pigeonhole versions before 0.5.7.2.
To fix CVE-2019-11500, it is recommended to update Dovecot to version 2.2.36.4 or 2.3.x version 2.3.7.2, and Pigeonhole to version 0.5.7.2.
Yes, you can find more information about CVE-2019-11500 at the following references: [Reference 1](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00024.html), [Reference 2](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00026.html), [Reference 3](http://www.openwall.com/lists/oss-security/2019/08/28/3)