CVE-2012-5620
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2012-5620 from the MITRE CVE dictionary dictionary and NIST NVD.
Statement
Red Hat does not consider this to be a security flaw as a user executing these commands will only succeed in preventing service to the current connection, and not to the server as a whole.
CVSS v2 metrics
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
| Base Score | 4 |
|---|---|
| Base Metrics | AV:N/AC:L/Au:S/C:N/I:N/A:P |
| Access Vector | Network |
| Access Complexity | Low |
| Authentication | Single |
| Confidentiality Impact | None |
| Integrity Impact | None |
| Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Enterprise Linux 6 | dovecot | Will not fix |
| Red Hat Enterprise Linux 5 | dovecot | Not affected |
CVE description copyright © 2017, The MITRE Corporation
