CVE-2017-15132

Related Vulnerabilities: CVE-2017-15132  

Aborting the process of SASL authentication can lead to a memory leak when the same login processes are reused. An attacker could use this flaw to cause a denial of service due to memory exhaustion.

Aborting the process of SASL authentication can lead to a memory leak when the same login processes are reused. An attacker could use this flaw to cause a denial of service due to memory exhaustion.

Find out more about CVE-2017-15132 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 5.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact Low

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 dovecot Will not fix
Red Hat Enterprise Linux 6 dovecot Will not fix
Red Hat Enterprise Linux 5 dovecot Not affected

Acknowledgements

Red Hat would like to thank The Dovecot Project for reporting this issue.

Mitigation

This issue can be mitigated on vulnerable systems by limiting the login process to a single request per process, which is also the default value.

External References