CVE-2011-1929
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
24/05/2011
Last modified:
11/04/2025
Description
lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:dovecot:dovecot:1.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:dovecot:dovecot:1.2.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://dovecot.org/pipermail/dovecot/2011-May/059085.html
- http://dovecot.org/pipermail/dovecot/2011-May/059086.html
- http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html
- http://openwall.com/lists/oss-security/2011/05/18/4
- http://openwall.com/lists/oss-security/2011/05/19/3
- http://openwall.com/lists/oss-security/2011/05/19/6
- http://osvdb.org/72495
- http://secunia.com/advisories/44683
- http://secunia.com/advisories/44712
- http://secunia.com/advisories/44756
- http://secunia.com/advisories/44771
- http://secunia.com/advisories/44827
- http://www.debian.org/security/2011/dsa-2252
- http://www.dovecot.org/doc/NEWS-1.2
- http://www.dovecot.org/doc/NEWS-2.0
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A101
- http://www.redhat.com/support/errata/RHSA-2011-1187.html
- http://www.securityfocus.com/bid/47930
- http://www.ubuntu.com/usn/USN-1143-1
- https://bugzilla.redhat.com/show_bug.cgi?id=706286
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67589
- https://hermes.opensuse.org/messages/8581790
- http://dovecot.org/pipermail/dovecot/2011-May/059085.html
- http://dovecot.org/pipermail/dovecot/2011-May/059086.html
- http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html
- http://openwall.com/lists/oss-security/2011/05/18/4
- http://openwall.com/lists/oss-security/2011/05/19/3
- http://openwall.com/lists/oss-security/2011/05/19/6
- http://osvdb.org/72495
- http://secunia.com/advisories/44683
- http://secunia.com/advisories/44712
- http://secunia.com/advisories/44756
- http://secunia.com/advisories/44771
- http://secunia.com/advisories/44827
- http://www.debian.org/security/2011/dsa-2252
- http://www.dovecot.org/doc/NEWS-1.2
- http://www.dovecot.org/doc/NEWS-2.0
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A101
- http://www.redhat.com/support/errata/RHSA-2011-1187.html
- http://www.securityfocus.com/bid/47930
- http://www.ubuntu.com/usn/USN-1143-1
- https://bugzilla.redhat.com/show_bug.cgi?id=706286
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67589
- https://hermes.opensuse.org/messages/8581790