Bug 238439 (CVE-2007-2231)

Summary: CVE-2007-2231 Directory traversal in dovecot with zlib plugin
Product: [Other] Security Response Reporter: Red Hat Product Security <security-response-team>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED CURRENTRELEASE QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: dhorak, kreilly
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://www.dovecot.org/list/dovecot-news/2007-March/000038.html
Whiteboard:
Fixed In Version: 1.0.7-2.el5 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-09-12 09:53:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 384771    
Bug Blocks:    

Description Lubomir Kundrak 2007-04-30 14:25:26 UTC
Description of problem:

In case zlib plugin is enabled, dovecot didn't check if mbox path
contained ".." which could be exploited to read compressed mailboxes
of other users.

As the dovecot-news post referred to in URL field states, this is an
unlikely scenario, as it moreover needs the files to be readable by
UID the dovecot is running under after the malicious user logs in.

Version-Release number of selected component (if applicable):

        Does not Affect: FC6
        Affects: FC5
        Affects: RHEL4
        Affects: RHEL5

Comment 6 Tomas Hoger 2008-04-09 09:13:35 UTC
Correction to comment #0:

This issue did not affect dovecot packages as shipped in Red Hat Enterprise
Linux 4, as they do not include zlib plugin.  Only dovecot in Red Hat Enterprise
Linux 5 was affected.


Comment 10 Red Hat Bugzilla 2009-10-23 19:05:37 UTC
Reporter changed to security-response-team by request of Jay Turner.