GLSA 200804-24: DBmail: Data disclosure

Severity:low
Title:DBmail: Data disclosure
Date:04/18/2008
Bugs: #218154
ID:200804-24

Synopsis

A vulnerability in DBMail could allow for passwordless login to any account under certain configurations.

Background

DBMail is a mail storage and retrieval daemon that uses SQL databases as its data store. IMAP and POP3 can be used to retrieve mails from the database.

Affected packages

Package Vulnerable Unaffected Architecture(s)
net-mail/dbmail < 2.2.9 >= 2.2.9 All supported architectures

Description

A vulnerability in DBMail's authldap module when used in conjunction with an Active Directory server has been reported by vugluskr. When passing a zero length password to the module, it tries to bind anonymously to the LDAP server. If the LDAP server allows anonymous binds, this bind succeeds and results in a successful authentication to DBMail.

Impact

By passing an empty password string to the server, an attacker could be able to log in to any account.

Workaround

There is no known workaround at this time.

Resolution

All DBMail users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-mail/dbmail-2.2.9"

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200804-24.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!