Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2008-4870

Publication date 1 November 2008

Last updated 24 July 2024


Ubuntu priority

dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.

Read the notes from the security team

Status

Package Ubuntu Release Status
dovecot 10.04 LTS lucid
Not affected
9.10 karmic
Not affected
9.04 jaunty
Not affected
8.10 intrepid Ignored end of life, was needed
8.04 LTS hardy Ignored
7.10 gutsy Ignored end of life, was needed
6.06 LTS dapper Ignored

Notes


jdstrand

marking as low because the default configuration doesn't set ssl_key_password


mdeslaur

file permissions can't be changed because of "deliver" Red Hat backported a new "!include_try" directive to the config file that allows including a second permission-protected config file (taken from 1.1.7) Debian says "by default this file doesnt containt sensitive information and administrator changing this should ensure on its own that the mode is secure" after discussion with kees and jdstrand, here's our plan: TODO: add a warning to the default conf file. on second thought, not worth risking a conf file prompt, so marking as ignored