Unfortunately we have our first problem that could really be counted as security hole. Giving "1 LIST .. *" IMAP command allows the user to see all files and directories under the mbox root's parent directory, so potentially you could see other users' mailbox names. Nothing can be done with them though, so it's not possible to read or modify them. There are also some other less than wanted behaviors that can be done with "." and ".." directories, such as "DELETE .." command can give errors. Also with maildir if you store indexes in different directory than mails this command can be used to delete the index files. Anyway I don't see any of these as security issues. Hopefully most people have their mail directory under user's home directory, so this would only list the home directory's contents. But if you do have users' mails stored in eg. under /var/mail/%u/ directory, giving that command would list everything under /var/mail, assuming that the process has permissions to do that (that's why you should be using different UIDs for users if possible). This affects 1.0 beta and 1.0 stable releases, but not 0.99.x. Fix is in http://dovecot.org/list/dovecot-cvs/2006-May/005563.html I'll also release 1.0 beta8 now. Thanks for Bill Boebel for noticing "DELETE .." doing weird things with maildir. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: This is a digitally signed message part Url : http://dovecot.org/pipermail/dovecot-news/attachments/20060512/6ac456bd/attachment.pgp
Tom Metro
2006-May-29 18:05 UTC
[Dovecot] [SECURITY] [DSA 1080-1] New dovecot packages fix directory traversal
Timo Sirainen wrote:> Unfortunately we have our first problem that could really be counted as > security hole. > > Giving "1 LIST .. *" IMAP command allows the user to see all files and > directories under the mbox root's parent directory, so potentially you > could see other users' mailbox names. Nothing can be done with them > though, so it's not possible to read or modify them....> This affects 1.0 beta and 1.0 stable releases, but not 0.99.x.FYI, I believe the Debian Security Announcement below corresponds with the above issue, and indicates that patched packages are now available. -Tom -------- Original Message -------- Subject: [SECURITY] [DSA 1080-1] New dovecot packages fix directory traversal Resent-Date: Mon, 29 May 2006 02:07:15 -0500 (CDT) Resent-From: debian-security-announce at lists.debian.org Date: Mon, 29 May 2006 09:05:36 +0200 (CEST) From: joey at infodrom.org (Steve Kemp) Reply-To: debian-security at lists.debian.org To: debian-security-announce at lists.debian.org (Debian Security Announcements) -------------------------------------------------------------------------- Debian Security Advisory DSA 1080-1 security at debian.org http://www.debian.org/security/ Steve Kemp May 29th, 2006 http://www.debian.org/security/faq -------------------------------------------------------------------------- Package : dovecot Vulnerability : programming error Problem type : remote Debian-specific: no CVE ID : CVE-2006-2414 A problem has been discovered in the IMAP component of Dovecot, a secure mail server that supports mbox and maildir mailboxes, which can lead to information disclosure via directory traversal by authenticated users. The old stable distribution (woody) is not affected by this problem. For the stable distribution (sarge) this problem has been fixed in version 0.99.14-1sarge0. For the unstable distribution (sid) this problem has been fixed in version 1.0beta8-1. We recommend that you upgrade your dovecot-imapd package. Upgrade Instructions - -------------------- [...] If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. [...] -------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce at lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> [...]