A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart.
References
Link | Resource |
---|---|
https://www.dovecot.org/list/dovecot-news/2018-February/000370.html | Release Notes Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1532356 | Issue Tracking Third Party Advisory |
http://seclists.org/oss-sec/2018/q1/205 | Mailing List Third Party Advisory |
https://www.debian.org/security/2018/dsa-4130 | Third Party Advisory |
https://usn.ubuntu.com/3587-1/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html | |
https://usn.ubuntu.com/3587-2/ |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-03-02 07:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-15130
Mitre link : CVE-2017-15130
JSON object : View
CWE
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
dovecot
- dovecot