Gentoo Logo

Dovecot: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200812-16 / dovecot
Release Date December 14, 2008
Latest Revision December 14, 2008: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-mail/dovecot < 1.1.7-r1 >= 1.1.7-r1 All supported architectures

Related bugreports: #240409, #244962, #245316


Multiple vulnerabilities were found in the Dovecot mailserver.

2.  Impact Information


Dovecot is an IMAP and POP3 server written with security primarily in mind.


Several vulnerabilities were found in Dovecot:

  • The "k" right in the acl_plugin does not work as expected (CVE-2008-4577, CVE-2008-4578)
  • The dovecot.conf is world-readable, providing improper protection for the ssl_key_password setting (CVE-2008-4870)
  • A permanent Denial of Service with broken mail headers is possible (CVE-2008-4907)


These vulnerabilities might allow a remote attacker to cause a Denial of Service, to circumvent security restrictions or allow local attackers to disclose the passphrase of the SSL private key.

3.  Resolution Information


There is no known workaround at this time.


All Dovecot users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/dovecot-1.1.7-r1"

Users should be aware that dovecot.conf will still be world-readable after the update. If employing ssl_key_password, it should not be used in dovecot.conf but in a separate file which should be included with "include_try".

4.  References


Page updated December 14, 2008

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.