exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2009-306

Mandriva Linux Security Advisory 2009-306
Posted Nov 30, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-306 - Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself. The updated packages have been patched to correct these issues.

tags | advisory, arbitrary, local
systems | linux, mandriva
advisories | CVE-2009-3897
SHA-256 | d9571c3961fd47c956899a4032f0b9a1cf3398e9d0bebaf5ba4b56b9ba832758

Mandriva Linux Security Advisory 2009-306

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:306
http://www.mandriva.com/security/
_______________________________________________________________________

Package : dovecot
Date : November 29, 2009
Affected: 2010.0
_______________________________________________________________________

Problem Description:

A vulnerability was discovered and corrected in dovecot:

Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of
certain directories at installation time, which allows local users to
access arbitrary user accounts by replacing the auth socket, related
to the parent directories of the base_dir directory, and possibly
the base_dir directory itself (CVE-2009-3897).

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3897
http://www.dovecot.org/list/dovecot-news/2009-November/000143.html
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2010.0:
d0764e505f706064fa6803bfbf2dc2da 2010.0/i586/dovecot-1.2.6-1.1mdv2010.0.i586.rpm
347393ff0a11bb9b4292422aaa3384ed 2010.0/i586/dovecot-devel-1.2.6-1.1mdv2010.0.i586.rpm
9d47e0d57dd0c48579bff14bbb370f6f 2010.0/i586/dovecot-plugins-gssapi-1.2.6-1.1mdv2010.0.i586.rpm
64dee1669ad6349d2716adceb1bc4cb0 2010.0/i586/dovecot-plugins-ldap-1.2.6-1.1mdv2010.0.i586.rpm
01d66bedd09be43518c3434bb3b2ca60 2010.0/i586/dovecot-plugins-managesieve-1.2.6-1.1mdv2010.0.i586.rpm
23167551a2233c73b3fbe4a00fe6b91c 2010.0/i586/dovecot-plugins-mysql-1.2.6-1.1mdv2010.0.i586.rpm
cd51dbfd87298d7c7f78d77fb7f1a0d4 2010.0/i586/dovecot-plugins-pgsql-1.2.6-1.1mdv2010.0.i586.rpm
7a3116333058345794ee217636900afb 2010.0/i586/dovecot-plugins-sieve-1.2.6-1.1mdv2010.0.i586.rpm
27c9947524ce85ddd433e5e4e886f12e 2010.0/i586/dovecot-plugins-sqlite-1.2.6-1.1mdv2010.0.i586.rpm
e1da0dc466433780dc0d502fbf5ab7bd 2010.0/SRPMS/dovecot-1.2.6-1.1mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
9c163a5bd8fea0f3b25ddc13b5b4f8e3 2010.0/x86_64/dovecot-1.2.6-1.1mdv2010.0.x86_64.rpm
10fcc7bef63f7d03bd86fa3dc2241ca0 2010.0/x86_64/dovecot-devel-1.2.6-1.1mdv2010.0.x86_64.rpm
b495c315980234f71cac5dcc65d29f0b 2010.0/x86_64/dovecot-plugins-gssapi-1.2.6-1.1mdv2010.0.x86_64.rpm
3a642f33ef442b0f5037ffa4b218d82c 2010.0/x86_64/dovecot-plugins-ldap-1.2.6-1.1mdv2010.0.x86_64.rpm
8639b1f5ec59b5321b667d932d86a59a 2010.0/x86_64/dovecot-plugins-managesieve-1.2.6-1.1mdv2010.0.x86_64.rpm
e705e9fb22327b3126f3f3a87c1da11e 2010.0/x86_64/dovecot-plugins-mysql-1.2.6-1.1mdv2010.0.x86_64.rpm
56e1158fc7531a6bcc62ca9c37246152 2010.0/x86_64/dovecot-plugins-pgsql-1.2.6-1.1mdv2010.0.x86_64.rpm
39e72fa61ce3d32cd9e8a564ac201a69 2010.0/x86_64/dovecot-plugins-sieve-1.2.6-1.1mdv2010.0.x86_64.rpm
a4ccb1389c9f47c059f8155de79942a4 2010.0/x86_64/dovecot-plugins-sqlite-1.2.6-1.1mdv2010.0.x86_64.rpm
e1da0dc466433780dc0d502fbf5ab7bd 2010.0/SRPMS/dovecot-1.2.6-1.1mdv2010.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLEpArmqjQ0CJFipgRAh7PAJ0SEs59M4B+GfUXqBvdqNsDOrTKoACg4KqJ
HJrTQRc4LVGhWNXc5+cAyIM=
=G4NY
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    10 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close