GLSA 200804-24: DBmail: Data disclosure
Severity: | low |
Title: | DBmail: Data disclosure |
Date: | 04/18/2008 |
Bugs: |
|
ID: | 200804-24 |
Synopsis
A vulnerability in DBMail could allow for passwordless login to any account under certain configurations.Background
DBMail is a mail storage and retrieval daemon that uses SQL databases as its data store. IMAP and POP3 can be used to retrieve mails from the database.
Affected packages
Package | Vulnerable | Unaffected | Architecture(s) |
---|---|---|---|
net-mail/dbmail | < 2.2.9 | >= 2.2.9 | All supported architectures |
Description
A vulnerability in DBMail's authldap module when used in conjunction with an Active Directory server has been reported by vugluskr. When passing a zero length password to the module, it tries to bind anonymously to the LDAP server. If the LDAP server allows anonymous binds, this bind succeeds and results in a successful authentication to DBMail.
Impact
By passing an empty password string to the server, an attacker could be able to log in to any account.
Workaround
There is no known workaround at this time.
Resolution
All DBMail users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-mail/dbmail-2.2.9"
References
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.