Bug 1532356 - (CVE-2017-15130) CVE-2017-15130 dovecot: TLS SNI config lookups are inefficient and can be used for DoS
CVE-2017-15130 dovecot: TLS SNI config lookups are inefficient and can be use...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20180228,reported=2...
: Security
Depends On: 1532357 1551756 1551757
Blocks: 1538713
  Show dependency treegraph
 
Reported: 2018-01-08 12:42 EST by Pedro Sampaio
Modified: 2018-04-19 21:31 EDT (History)
8 users (show)

See Also:
Fixed In Version: dovecot 2.2.34, dovecot 2.3.1
Doc Type: If docs needed, set a value
Doc Text:
A denial of service flaw was found in dovecot. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Pedro Sampaio 2018-01-08 12:42:03 EST
TLS SNI config lookups may lead to excessive memory usage, causing imap-login/pop3-login VSZ limit to be reached and the process restarted. This happens only if Dovecot config has local_name { } or local { } configuration blocks and attacker uses randomly generated SNI servernames.
Comment 2 Pedro Sampaio 2018-01-08 12:49:47 EST
Acknowledgments:

Name: The Dovecot Project
Comment 3 Adam Mariš 2018-03-01 05:47:56 EST
Reference:

http://www.openwall.com/lists/oss-security/2018/03/01/3
Comment 4 Pedro Yóssis Silva Barbosa 2018-03-01 08:23:56 EST
TLS SNI config lookups may lead to excessive memory usage, causing imap-login/pop3-login VSZ limit to be reached and the process restarted. This happens only if Dovecot config has local_name { } or local { } configuration blocks and attacker uses randomly generated SNI servernames.
Comment 6 Pedro Yóssis Silva Barbosa 2018-03-01 10:50:34 EST
External References:

https://www.dovecot.org/list/dovecot-news/2018-February/000370.html

Note You need to log in before you can comment on or make changes to this bug.