Vulnerability Name:

CVE-2010-3706 (CCN-62256)

Assigned:2010-10-02
Published:2010-10-02
Updated:2011-02-12
Summary:plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)
4.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2010-3706

Source: SUSE
Type: UNKNOWN
SUSE-SR:2010:020

Source: MLIST
Type: UNKNOWN
[oss-security] 20101004 CVE Request: more dovecot ACL issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20101004 Re: CVE Request: more dovecot ACL issues

Source: CCN
Type: SA41723
Dovecot ACL Handling Security Issue

Source: SECUNIA
Type: UNKNOWN
43220

Source: MLIST
Type: Vendor Advisory
[dovecot] 20101002 v1.2.15 released

Source: CCN
Type: Dovecot Web Site
[Dovecot] v2.0.5 released

Source: MLIST
Type: Vendor Advisory
[dovecot] 20101002 v2.0.5 released

Source: MLIST
Type: UNKNOWN
[dovecot] 20101002 ACL handling bugs in v1.2.8+ and v2.0

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2010:217

Source: CCN
Type: OSVDB ID: 68516
Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass

Source: CCN
Type: BID-43690
Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-1059-1

Source: VUPEN
Type: Vendor Advisory
ADV-2010-2572

Source: VUPEN
Type: UNKNOWN
ADV-2010-2840

Source: VUPEN
Type: UNKNOWN
ADV-2011-0301

Source: XF
Type: UNKNOWN
dovecot-mailbox-sec-bypass(62256)

Source: SUSE
Type: SUSE-SR:2010:020
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:dovecot:dovecot:1.2.0:-:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.9:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.10:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.11:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.12:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.13:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.14:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:dovecot:dovecot:2.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:2.0.4:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:dovecot:dovecot:1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.11:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.12:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.13:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:1.2.14:*:*:*:*:*:*:*
  • OR cpe:/a:dovecot:dovecot:2.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20103706
    V
    CVE-2010-3706
    2015-11-16
    oval:org.mitre.oval:def:13521
    P
    USN-1059-1 -- dovecot vulnerabilities
    2014-06-30
    BACK
    dovecot dovecot 1.2.0
    dovecot dovecot 1.2.1
    dovecot dovecot 1.2.2
    dovecot dovecot 1.2.3
    dovecot dovecot 1.2.4
    dovecot dovecot 1.2.5
    dovecot dovecot 1.2.6
    dovecot dovecot 1.2.7
    dovecot dovecot 1.2.8
    dovecot dovecot 1.2.9
    dovecot dovecot 1.2.10
    dovecot dovecot 1.2.11
    dovecot dovecot 1.2.12
    dovecot dovecot 1.2.13
    dovecot dovecot 1.2.14
    dovecot dovecot 2.0.0
    dovecot dovecot 2.0.1
    dovecot dovecot 2.0.2
    dovecot dovecot 2.0.3
    dovecot dovecot 2.0.4
    dovecot dovecot 1.2.7
    dovecot dovecot 1.2.8
    dovecot dovecot 1.2.11
    dovecot dovecot 1.2.12
    dovecot dovecot 1.2.13
    dovecot dovecot 1.2.14
    dovecot dovecot 2.0
    mandriva linux 2010
    mandriva linux 2010