Vulnerability Name:

CVE-2008-1199 (CCN-41009)

Assigned:2008-03-04
Published:2008-03-04
Updated:2018-10-11
Summary:Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
CVSS v3 Severity:5.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P)
3.2 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
3.3 Low (CCN CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N)
2.5 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
3.7 Low (REDHAT CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
2.7 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-59
CWE-16
Vulnerability Consequences:File Manipulation
References:Source: CCN
Type: BugTraq Mailing List, Tue Mar 04 2008 - 00:47:53 CST
Dovecot mail_extra_groups setting is often used insecurely

Source: MITRE
Type: CNA
CVE-2008-1199

Source: SUSE
Type: UNKNOWN
SUSE-SR:2008:020

Source: CCN
Type: RHSA-2008-0297
Low: dovecot security and bug fix update

Source: SECUNIA
Type: UNKNOWN
29226

Source: SECUNIA
Type: UNKNOWN
29385

Source: SECUNIA
Type: UNKNOWN
29396

Source: SECUNIA
Type: UNKNOWN
29557

Source: SECUNIA
Type: UNKNOWN
30342

Source: SECUNIA
Type: UNKNOWN
32151

Source: GENTOO
Type: UNKNOWN
GLSA-200803-25

Source: DEBIAN
Type: UNKNOWN
DSA-1516

Source: DEBIAN
Type: DSA-1516
dovecot -- privilege escalation

Source: CCN
Type: Dovecot Web site
Dovecot

Source: CCN
Type: Dovecot Changelog, Tue Mar 4 08:37:56 EET 2008
[Dovecot-news] v1.0.11 released

Source: MLIST
Type: Patch
[Dovecot-news] 20080504 v1.0.11 released

Source: CCN
Type: GLSA-200803-25
Dovecot: Multiple vulnerabilities

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0297

Source: BUGTRAQ
Type: UNKNOWN
20080304 Dovecot mail_extra_groups setting is often used insecurely

Source: BID
Type: Patch
28092

Source: CCN
Type: BID-28092
Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability

Source: CCN
Type: USN-593-1
Dovecot vulnerabilities

Source: XF
Type: UNKNOWN
dovecot-mailextragroups-unauth-access(41009)

Source: XF
Type: UNKNOWN
dovecot-mailextragroups-unauth-access(41009)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10739

Source: UBUNTU
Type: UNKNOWN
USN-593-1

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-2464

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-2475

Source: SUSE
Type: SUSE-SR:2008:020
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:dovecot:dovecot:0.99.13:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:0.99.14:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.beta2:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.beta3:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.beta7:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.beta8:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc1:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc2:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc3:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc4:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc5:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc6:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc7:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc8:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc9:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc10:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc11:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc12:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc13:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc14:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0.rc15:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.0_rc29:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:17635
    P
    USN-593-1 -- dovecot vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:18006
    P
    DSA-1516-1 dovecot - privilege escalation
    2014-06-23
    oval:org.mitre.oval:def:8054
    P
    DSA-1516 dovecot -- privilege escalation
    2014-06-23
    oval:org.mitre.oval:def:22086
    P
    ELSA-2008:0297: dovecot security and bug fix update (Low)
    2014-05-26
    oval:org.mitre.oval:def:10739
    V
    Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
    2013-04-29
    oval:org.opensuse.security:def:20081199
    V
    CVE-2008-1199
    2012-11-01
    oval:com.redhat.rhsa:def:20080297
    P
    RHSA-2008:0297: dovecot security and bug fix update (Low)
    2008-05-21
    oval:org.debian:def:1516
    V
    privilege escalation
    2008-03-14
    BACK
    dovecot dovecot 0.99.13
    dovecot dovecot 0.99.14
    dovecot dovecot 1.0
    dovecot dovecot 1.0.2
    dovecot dovecot 1.0.3
    dovecot dovecot 1.0.4
    dovecot dovecot 1.0.5
    dovecot dovecot 1.0.6
    dovecot dovecot 1.0.7
    dovecot dovecot 1.0.8
    dovecot dovecot 1.0.9
    dovecot dovecot 1.0.10
    dovecot dovecot 1.0.beta2
    dovecot dovecot 1.0.beta3
    dovecot dovecot 1.0.beta7
    dovecot dovecot 1.0.beta8
    dovecot dovecot 1.0.rc1
    dovecot dovecot 1.0.rc2
    dovecot dovecot 1.0.rc3
    dovecot dovecot 1.0.rc4
    dovecot dovecot 1.0.rc5
    dovecot dovecot 1.0.rc6
    dovecot dovecot 1.0.rc7
    dovecot dovecot 1.0.rc8
    dovecot dovecot 1.0.rc9
    dovecot dovecot 1.0.rc10
    dovecot dovecot 1.0.rc11
    dovecot dovecot 1.0.rc12
    dovecot dovecot 1.0.rc13
    dovecot dovecot 1.0.rc14
    dovecot dovecot 1.0.rc15
    dovecot dovecot 1.0_rc29