Vulnerability Description
checkpassword-reply in Dovecot before 2.2.7 performs setuid operations to a user who is authenticating, which allows local users to bypass authentication and access virtual email accounts by attaching to the process and using a restricted file descriptor to modify account information in the response to the dovecot-auth server.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dovecot | Dovecot | <= 2.2.6 |
Related Weaknesses (CWE)
References
- http://cpanel.net/tsr-2013-0010-full-disclosure/
- http://secunia.com/advisories/54808Vendor Advisory
- http://wiki2.dovecot.org/AuthDatabase/CheckPassword#Security
- http://www.dovecot.org/list/dovecot-news/2013-November/000264.htmlPatch
- https://usn.ubuntu.com/3556-2/
- http://cpanel.net/tsr-2013-0010-full-disclosure/
- http://secunia.com/advisories/54808Vendor Advisory
- http://wiki2.dovecot.org/AuthDatabase/CheckPassword#Security
- http://www.dovecot.org/list/dovecot-news/2013-November/000264.htmlPatch
- https://usn.ubuntu.com/3556-2/
FAQ
What is CVE-2013-6171?
CVE-2013-6171 is a vulnerability with a CVSS score of 5.8 (MEDIUM). checkpassword-reply in Dovecot before 2.2.7 performs setuid operations to a user who is authenticating, which allows local users to bypass authentication and access virtual email accounts by attaching...
How severe is CVE-2013-6171?
CVE-2013-6171 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6171?
Check the references section above for vendor advisories and patch information. Affected products include: Dovecot Dovecot.