DescriptionThe Debian courier-authlib package before 0.71.1-2 for Courier Authentication Library creates a /run/courier/authdaemon directory with weak permissions, allowing an attacker to read user information. This may include a cleartext password in some configurations. In general, it includes the user's existence, uid and gids, home and/or Maildir directory, quota, and some type of password information (such as a hash).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs984810

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
courier-authlib (PTS)stretch0.66.4-9vulnerable
stretch (security)0.66.4-9+deb9u1fixed
bullseye, sid0.71.1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[buster] - courier-authlib <no-dsa> (Minor issue)
Re-introduction of #378571 while migrating from debian/permissions to
debian/courier-authdaemon.tmpfiles in 0.66.4-2.

Search for package or bug name: Reporting problems