USN-4456-1: Dovecot vulnerabilities

Publication date

12 August 2020

Overview

Several security issues were fixed in Dovecot.


Packages

  • dovecot - IMAP and POP3 email server

Details

It was discovered that Dovecot incorrectly handled deeply nested MIME
parts. A remote attacker could possibly use this issue to cause Dovecot to
consume resources, resulting in a denial of service. (CVE-2020-12100)

It was discovered that Dovecot incorrectly handled memory when using NTLM.
A remote attacker could possibly use this issue to cause Dovecot to crash,
resulting in a denial of service. (CVE-2020-12673)

It was discovered that the Dovecot RPA mechanism incorrectly handled
zero-length messages. A remote attacker could possibly use this issue to
cause Dovecot to crash, resulting in a denial of service. (CVE-2020-12674)

It was discovered that Dovecot incorrectly handled deeply nested MIME
parts. A remote attacker could possibly use this issue to cause Dovecot to
consume resources, resulting in a denial of service. (CVE-2020-12100)

It was discovered that Dovecot incorrectly handled memory when using NTLM.
A remote attacker could possibly use this issue to cause Dovecot to crash,
resulting in a denial of service. (CVE-2020-12673)

It was discovered that the Dovecot RPA mechanism incorrectly handled
zero-length messages. A remote attacker could possibly use this issue to
cause Dovecot to crash, resulting in a denial of service. (CVE-2020-12674)

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
20.04 focal dovecot-core –  1:2.3.7.2-1ubuntu3.2
18.04 bionic dovecot-core –  1:2.2.33.2-1ubuntu4.6
16.04 xenial dovecot-core –  1:2.2.22-1ubuntu2.13

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›