Improper Verification of Source of a Communication Channel Affecting dovecot-mysql package, versions *


Severity

Recommended
0.0
medium
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS9-DOVECOTMYSQL-16759352
  • published19 May 2026
  • disclosed12 May 2026

Introduced: 12 May 2026

NewCVE-2026-33603  (opens in a new tab)
CWE-940  (opens in a new tab)

How to fix?

There is no fixed version for Centos:9 dovecot-mysql.

NVD Description

Note: Versions mentioned in the description apply only to the upstream dovecot-mysql package and not the dovecot-mysql package as distributed by Centos. See How to fix? for Centos:9 relevant fixed versions and status.

Attacker can use a specially crafted base64 exchange between Dovecot and Client to fake SCRAM TLS channel binding. This requires that the attacker is able to position itself between Dovecot and the client connection. If successful, the attacker can eavesdrop communications between Dovecot and client as MITM proxy. Install fixed version. No publicly available exploits are known.

CVSS Base Scores

version 3.1