Der Bug ist besonders kritisch auf kombinierten Web-/Mail-Systemen und in Shared Hosting Umgebungen. Jeder Prozess (z. B. auch eine gehackte Webanwendung) kann auf die Weise ggf. Authentifizierung gegen den MTA aushebeln und massenhaft Spam rauspusten.CVE-2009-3897 wrote:Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
Sicherheitslücke in Dovecot
Sicherheitslücke in Dovecot
“Some humans would do anything to see if it was possible to do it. If you put a large switch in some cave somewhere, with a sign on it saying 'End-of-the-World Switch. PLEASE DO NOT TOUCH', the paint wouldn't even have time to dry.” — Terry Pratchett, Thief of Time