Description
A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1333-1 | dovecot security update |
Debian DSA |
DSA-4130-1 | dovecot security update |
EUVD |
EUVD-2017-6593 | A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion. |
Ubuntu USN |
USN-3556-1 | Dovecot vulnerability |
Ubuntu USN |
USN-3556-2 | Dovecot vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-17T00:36:33.953Z
Reserved: 2017-10-08T00:00:00.000Z
Link: CVE-2017-15132
No data.
Status : Modified
Published: 2018-01-25T20:29:00.213
Modified: 2024-11-21T03:14:08.107
Link: CVE-2017-15132
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN