CVE-2010-3707
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
06/10/2010
Last modified:
11/04/2025
Description
plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
Impact
Base Score 2.0
5.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:dovecot:dovecot:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dovecot:dovecot:1.2.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html
- http://marc.info/?l=oss-security&m=128620520732377&w=2
- http://marc.info/?l=oss-security&m=128622064325688&w=2
- http://secunia.com/advisories/43220
- http://www.dovecot.org/list/dovecot/2010-October/053450.html
- http://www.dovecot.org/list/dovecot/2010-October/053451.html
- http://www.dovecot.org/list/dovecot/2010-October/053452.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A217
- http://www.redhat.com/support/errata/RHSA-2011-0600.html
- http://www.ubuntu.com/usn/USN-1059-1
- http://www.vupen.com/english/advisories/2010/2572
- http://www.vupen.com/english/advisories/2010/2840
- http://www.vupen.com/english/advisories/2011/0301
- http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html
- http://marc.info/?l=oss-security&m=128620520732377&w=2
- http://marc.info/?l=oss-security&m=128622064325688&w=2
- http://secunia.com/advisories/43220
- http://www.dovecot.org/list/dovecot/2010-October/053450.html
- http://www.dovecot.org/list/dovecot/2010-October/053451.html
- http://www.dovecot.org/list/dovecot/2010-October/053452.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A217
- http://www.redhat.com/support/errata/RHSA-2011-0600.html
- http://www.ubuntu.com/usn/USN-1059-1
- http://www.vupen.com/english/advisories/2010/2572
- http://www.vupen.com/english/advisories/2010/2840
- http://www.vupen.com/english/advisories/2011/0301



