CVE-2014-3430
Severity CVSS v4.0:
Pending analysis
Type:
CWE-287
Authentication Issues
Publication date:
14/05/2014
Last modified:
12/04/2025
Description
Dovecot 1.1 before 2.2.13 and dovecot-ee before 2.1.7.7 and 2.2.x before 2.2.12.12 does not properly close old connections, which allows remote attackers to cause a denial of service (resource consumption) via an incomplete SSL/TLS handshake for an IMAP/POP3 connection.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:dovecot:dovecot:1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.1.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2014-0223.html
- http://dovecot.org/pipermail/dovecot-news/2014-May/000273.html
- http://linux.oracle.com/errata/ELSA-2014-0790.html
- http://permalink.gmane.org/gmane.mail.imap.dovecot/77499
- http://rhn.redhat.com/errata/RHSA-2014-0790.html
- http://secunia.com/advisories/59051
- http://secunia.com/advisories/59537
- http://secunia.com/advisories/59552
- http://www.debian.org/security/2014/dsa-2954
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A113
- http://www.openwall.com/lists/oss-security/2014/05/09/4
- http://www.openwall.com/lists/oss-security/2014/05/09/8
- http://www.securityfocus.com/bid/67306
- http://www.ubuntu.com/usn/USN-2213-1
- http://advisories.mageia.org/MGASA-2014-0223.html
- http://dovecot.org/pipermail/dovecot-news/2014-May/000273.html
- http://linux.oracle.com/errata/ELSA-2014-0790.html
- http://permalink.gmane.org/gmane.mail.imap.dovecot/77499
- http://rhn.redhat.com/errata/RHSA-2014-0790.html
- http://secunia.com/advisories/59051
- http://secunia.com/advisories/59537
- http://secunia.com/advisories/59552
- http://www.debian.org/security/2014/dsa-2954
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A113
- http://www.openwall.com/lists/oss-security/2014/05/09/4
- http://www.openwall.com/lists/oss-security/2014/05/09/8
- http://www.securityfocus.com/bid/67306
- http://www.ubuntu.com/usn/USN-2213-1



