![]() |
|
Message-ID: <05da3e26-eacc-7a33-67aa-0a90d3bd51ae@apache.org> Date: Wed, 05 Feb 2025 17:05:10 +0000 From: Benoit Tellier <btellier@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-37358: Apache James: denial of service through the use of IMAP literals Affected versions: - Apache James server through 3.7.5 - Apache James server 3.8.0 through 3.8.1 Description: Similarly to CVE-2024-34055, Apache James is vulnerable to denial of service through the abuse of IMAP literals from both authenticated and unauthenticated users, which could be used to cause unbounded memory allocation and very long computations Version 3.7.6 and 3.8.2 restrict such illegitimate use of IMAP literals. Credit: Xavier GUIMARD (reporter) Benoit TELLIER (coordinator) References: https://james.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-37358
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.