Package: dovecot
Severity: important
Tags: security

Quoting from the 2.2.7 announcement:
http://www.dovecot.org/list/dovecot-news/2013-November/000264.html

| Some usage of passdb checkpassword could have been exploitable by
| local users. You may need to modify your setup to keep it working.
| See http://wiki2.dovecot.org/AuthDatabase/CheckPassword#Security

Quoting from http://wiki2.dovecot.org/AuthDatabase/CheckPassword#Security:

| The standard checkpassword design is incompatible with Dovecot's security 
model. If 
| the system has local users and the checkpassword script setuid()s into a 
local user, 
| the user is able to ptrace into the communication and change the 
authentication results. 
| This is of course undesirable, so v2.2.7+ will just refuse to run in such 
environments 
| by default. The possibilities to solve this are:
|    If possible, change the checkpassword to return userdb_uid and userdb_gid 
extra fields 
| instead of using setuid() and setgid(). This also improves the performance.
|    If you can't change the script, you can make Dovecot's checkpassword-reply 
binary 
| setuid or setgid (e.g. chgrp dovecot 
/usr/local/libexec/dovecot/checkpassword-reply; 
| chmod g+s /usr/local/libexec/dovecot/checkpassword-reply)
|
| If you don't have any untrusted local users and you just don't care about 
this check, you 
| can set INSECURE_SETUID=1 environment e.g. with a wrapper checkpassword 
script. 

I'm not sure if that needs to be backported to stable given? How popular is the 
Checkpassword
auth framework?

Cheers,
        Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to