Vulnerability Details : CVE-2010-3779
Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
Exploit prediction scoring system (EPSS) score for CVE-2010-3779
Probability of exploitation activity in the next 30 days: 0.22%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 60 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-3779
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST |
CWE ids for CVE-2010-3779
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-3779
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:217
mandriva.com
-
http://www.dovecot.org/list/dovecot/2010-October/053452.html
[Dovecot] ACL handling bugs in v1.2.8+ and v2.0
-
http://www.dovecot.org/list/dovecot/2010-October/053450.html
[Dovecot] v1.2.15 releasedVendor Advisory
-
http://www.vupen.com/english/advisories/2010/2840
Webmail | OVH- OVH
-
http://www.ubuntu.com/usn/USN-1059-1
USN-1059-1: Dovecot vulnerabilities | Ubuntu security notices
-
http://www.vupen.com/english/advisories/2011/0301
Webmail | OVH- OVH
Products affected by CVE-2010-3779
- cpe:2.3:a:dovecot:dovecot:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:1.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:dovecot:dovecot:2.0:beta1:*:*:*:*:*:*