CVE-2011-4318Improper Input Validation in Dovecot

Severity
5.8MEDIUMNVD
EPSS
0.4%
top 40.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 7
Latest updateMay 17

Description

Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.

CVSS vector

AV:N/AC:M/C:P/I:P/A:NExploitability: 8.6 | Impact: 4.9

Affected Packages3 packages

debiandebian/dovecot< dovecot 1:2.0.18-1 (bookworm)
Debiandovecot/dovecot< 1:2.0.18-1+3
NVDdovecot/dovecot16 versions+15

🔴Vulnerability Details

2
GHSA
GHSA-w2rf-p589-jpp8: Dovecot 22022-05-17
OSV
CVE-2011-4318: Dovecot 22013-03-07

📋Vendor Advisories

3
Ubuntu
Dovecot vulnerability2011-12-08
Red Hat
dovecot: proxy destination host name not checked against SSL certificate name2011-11-17
Debian
CVE-2011-4318: dovecot - Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is use...2011

💬Community

1
Bugzilla
CVE-2011-4318 dovecot: proxy destination host name not checked against SSL certificate name2011-11-18