From owner-freebsd-vuxml@FreeBSD.ORG Sun Nov 30 16:36:29 2008 Return-Path: Delivered-To: freebsd-vuxml@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id E70B61065676; Sun, 30 Nov 2008 16:36:29 +0000 (UTC) (envelope-from rea-fbsd@codelabs.ru) Received: from 0.mx.codelabs.ru (0.mx.codelabs.ru [144.206.177.45]) by mx1.freebsd.org (Postfix) with ESMTP id 9C0D78FC0C; Sun, 30 Nov 2008 16:36:29 +0000 (UTC) (envelope-from rea-fbsd@codelabs.ru) DomainKey-Signature: a=rsa-sha1; q=dns; c=simple; s=one; d=codelabs.ru; h=Received:To:Subject:From:Reply-To:Cc:X-send-pr-version:X-GNATS-Notify:Message-Id:Date; b=dFzyqhCMDKYK95/xM10j8lJdaFx41Dt3jgjVjoSj0PyXZHdrNixVPzuuS/OXPawUYnAqCjsPlkV6JxRksg7R/OhYhnx1U1AL6iypM9FQYMGt5Y4DcssQ8hPrvfDJO+XdPLK3pmJvKW/f+V8WEFaJwuOf5L/0ICOBCjD/6GYWhRc=; Received: from phoenix.codelabs.ru (ppp85-141-162-16.pppoe.mtu-net.ru [85.141.162.16]) by 0.mx.codelabs.ru with esmtps (TLSv1:CAMELLIA256-SHA:256) id 1L6pHY-0006T6-Nt; Sun, 30 Nov 2008 19:36:28 +0300 To: FreeBSD-gnats-submit@freebsd.org From: Eygene Ryabinkin X-send-pr-version: 3.113 X-GNATS-Notify: dgeo@ec-marseille.fr Message-Id: <20081129115715.11BBBB8041@phoenix.codelabs.ru> Date: Sat, 29 Nov 2008 14:57:15 +0300 (MSK) X-Mailman-Approved-At: Sun, 30 Nov 2008 17:16:19 +0000 Cc: freebsd-vuxml@freebsd.org Subject: [vuxml] document vulnerability in dovecot-managesieve X-BeenThere: freebsd-vuxml@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Eygene Ryabinkin List-Id: Documenting security issues in VuXML List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 30 Nov 2008 16:36:30 -0000 >Submitter-Id: current-users >Originator: Eygene Ryabinkin >Organization: Code Labs >Confidential: no >Synopsis: [vuxml] document vulnerability in dovecot-managesieve >Severity: serious >Priority: medium >Category: ports >Class: sw-bug >Release: FreeBSD 7.0-STABLE amd64 >Environment: System: FreeBSD 7.0-STABLE amd64 >Description: There is a bug in the dovecot-managesieve that allows virtual users to get read/write access to the other's sieve files in some curcumstances: http://www.dovecot.org/list/dovecot/2008-November/035259.html >How-To-Repeat: Look at http://www.dovecot.org/list/dovecot/2008-November/035259.html PR ports/129028 mentions the security vulnerability (that was eliminated by that PR), but does not add a new VuXML entry. >Fix: The following VuXML entry should be evaluated and added: --- vuln.xml begins here --- dovecot-managesieve -- unallowed read/write access to the sieve scripts by virtual users dovecot-managesieve 0.10.4 0.11.00.11.1

Stephan Bosch, maintainer of dovecot-managesieve, reports:

…clever virtual users that know the directory structure of the server can read and edit script files of other virtual users with the same system uid.

http://www.dovecot.org/list/dovecot/2008-November/035259.html http://secunia.com/Advisories/32768/ 2008-11-17 TODAY
--- vuln.xml ends here --- I had marked port versions '>=0.11.0<0.11.1' to be affected too, because these upstream versions are affected. There are no such port versions in the official FreeBSD ports tree.