Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2021-29157 CVE-2021-33515 |
CWE-ID | CWE-22 CWE-74 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Manager Proxy Operating systems & Components / Operating system SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing Operating systems & Components / Operating system SUSE Enterprise Storage Operating systems & Components / Operating system SUSE CaaS Platform Operating systems & Components / Operating system SUSE Linux Enterprise Server Operating systems & Components / Operating system dovecot23-fts-squat-debuginfo Operating systems & Components / Operating system package or component dovecot23-fts-squat Operating systems & Components / Operating system package or component dovecot23-fts-solr-debuginfo Operating systems & Components / Operating system package or component dovecot23-fts-solr Operating systems & Components / Operating system package or component dovecot23-fts-lucene-debuginfo Operating systems & Components / Operating system package or component dovecot23-fts-lucene Operating systems & Components / Operating system package or component dovecot23-fts-debuginfo Operating systems & Components / Operating system package or component dovecot23-fts Operating systems & Components / Operating system package or component dovecot23-devel Operating systems & Components / Operating system package or component dovecot23-debugsource Operating systems & Components / Operating system package or component dovecot23-debuginfo Operating systems & Components / Operating system package or component dovecot23-backend-sqlite-debuginfo Operating systems & Components / Operating system package or component dovecot23-backend-sqlite Operating systems & Components / Operating system package or component dovecot23-backend-pgsql-debuginfo Operating systems & Components / Operating system package or component dovecot23-backend-pgsql Operating systems & Components / Operating system package or component dovecot23-backend-mysql-debuginfo Operating systems & Components / Operating system package or component dovecot23-backend-mysql Operating systems & Components / Operating system package or component dovecot23 Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU54285
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-29157
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform directory traversal attacks.
The vulnerability exists due to validation of kid and azp fields in JWT tokens. A local user to ability to control a JWT token location can login as any MTA user and access their emails.
Update the affected package dovecot23 to the latest version.
Vulnerable software versionsSUSE Manager Proxy: 4.0
SUSE Manager Retail Branch Server: 4.0
SUSE Manager Server: 4.0
SUSE Linux Enterprise Server for SAP: 15-SP1
SUSE Linux Enterprise High Performance Computing: 15-SP1-LTSS - 15-SP1-ESPOS
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE Linux Enterprise Server: 15-SP1-BCL - 15-SP1-LTSS
dovecot23-fts-squat-debuginfo: before 2.3.11.3-24.1
dovecot23-fts-squat: before 2.3.11.3-24.1
dovecot23-fts-solr-debuginfo: before 2.3.11.3-24.1
dovecot23-fts-solr: before 2.3.11.3-24.1
dovecot23-fts-lucene-debuginfo: before 2.3.11.3-24.1
dovecot23-fts-lucene: before 2.3.11.3-24.1
dovecot23-fts-debuginfo: before 2.3.11.3-24.1
dovecot23-fts: before 2.3.11.3-24.1
dovecot23-devel: before 2.3.11.3-24.1
dovecot23-debugsource: before 2.3.11.3-24.1
dovecot23-debuginfo: before 2.3.11.3-24.1
dovecot23-backend-sqlite-debuginfo: before 2.3.11.3-24.1
dovecot23-backend-sqlite: before 2.3.11.3-24.1
dovecot23-backend-pgsql-debuginfo: before 2.3.11.3-24.1
dovecot23-backend-pgsql: before 2.3.11.3-24.1
dovecot23-backend-mysql-debuginfo: before 2.3.11.3-24.1
dovecot23-backend-mysql: before 2.3.11.3-24.1
dovecot23: before 2.3.11.3-24.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212124-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54286
Risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-33515
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists in the way STARTTLS command in processed by the SMTP server. the commands sent during the session before the STARTTLS command are queued and executed later, after the STARTTLS finished with the client. As a result, a remote attacker can perform a MitM attack and gain access to victim's emails.
Update the affected package dovecot23 to the latest version.
Vulnerable software versionsSUSE Manager Proxy: 4.0
SUSE Manager Retail Branch Server: 4.0
SUSE Manager Server: 4.0
SUSE Linux Enterprise Server for SAP: 15-SP1
SUSE Linux Enterprise High Performance Computing: 15-SP1-LTSS - 15-SP1-ESPOS
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE Linux Enterprise Server: 15-SP1-BCL - 15-SP1-LTSS
dovecot23-fts-squat-debuginfo: before 2.3.11.3-24.1
dovecot23-fts-squat: before 2.3.11.3-24.1
dovecot23-fts-solr-debuginfo: before 2.3.11.3-24.1
dovecot23-fts-solr: before 2.3.11.3-24.1
dovecot23-fts-lucene-debuginfo: before 2.3.11.3-24.1
dovecot23-fts-lucene: before 2.3.11.3-24.1
dovecot23-fts-debuginfo: before 2.3.11.3-24.1
dovecot23-fts: before 2.3.11.3-24.1
dovecot23-devel: before 2.3.11.3-24.1
dovecot23-debugsource: before 2.3.11.3-24.1
dovecot23-debuginfo: before 2.3.11.3-24.1
dovecot23-backend-sqlite-debuginfo: before 2.3.11.3-24.1
dovecot23-backend-sqlite: before 2.3.11.3-24.1
dovecot23-backend-pgsql-debuginfo: before 2.3.11.3-24.1
dovecot23-backend-pgsql: before 2.3.11.3-24.1
dovecot23-backend-mysql-debuginfo: before 2.3.11.3-24.1
dovecot23-backend-mysql: before 2.3.11.3-24.1
dovecot23: before 2.3.11.3-24.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212124-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.