Dovecot is an internet message access protocol, or IMAP server, adopted globally and with performance and security-oriented design.
In accordance with our coordinated disclosure policy, Talos has worked with Dovecot to ensure that this issue has been resolved. Dovecot has released version 2.2.34 to address this issue. Talos recommends installing this update as quickly as possible on affected systems.
Discovered by Aleksander Nikolic:
TALOS-2017-0510 / CVE-2017-14461 is an out-of-bounds read vulnerability in the RFC822 parser implemented in Dovecot IMAP Server 2.2.33.2. RFC822 deals specifically with the standard for ARPA internet text messages. An attacker could use a specially crafted email delivered over SMTP and passed on to Dovecot by the Message Transfer Agent or MTA to trigger an out-of-bounds read that potentially results in the disclosure of sensitive information and a denial of service. Full details of the vulnerability are available here.
Reference
http://blog.talosintelligence.com/2018/03/dovecot-vulnerability.html#more
Pedro Tavares is a professional in the field of information security working as an Ethical Hacker/Pentester, Malware Researcher and also a Security Evangelist. He is also a founding member at CSIRT.UBI and Editor-in-Chief of the security computer blog seguranca-informatica.pt.
In recent years he has invested in the field of information security, exploring and analyzing a wide range of topics, such as pentesting (Kali Linux), malware, exploitation, hacking, IoT and security in Active Directory networks. He is also Freelance Writer (Infosec. Resources Institute and Cyber Defense Magazine) and developer of the 0xSI_f33d – a feed that compiles phishing and malware campaigns targeting Portuguese citizens.
Read more here.