Description
Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially crafted %variable fields could result in excessive memory usage causing the process to crash (and restart), or excessive CPU usage causing all authentications to hang.
Published: 2018-06-21
Score: 3.7 Low
EPSS: 6.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-3828-1 dovecot security update
EUVD EUVD EUVD-2017-11814 Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially crafted %variable fields could result in excessive memory usage causing the process to crash (and restart), or excessive CPU usage causing all authentications to hang.
Ubuntu USN Ubuntu USN USN-3258-1 Dovecot vulnerability
Ubuntu USN Ubuntu USN USN-3258-2 Dovecot regression
History

No history.

Subscriptions

Debian Debian Linux
Dovecot Dovecot
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T14:02:06.877Z

Reserved: 2016-12-01T00:00:00.000Z

Link: CVE-2017-2669

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-21T13:29:00.317

Modified: 2024-11-21T03:23:56.570

Link: CVE-2017-2669

cve-icon Redhat

Severity : Low

Publid Date: 2017-04-10T00:00:00Z

Links: CVE-2017-2669 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses