icon

We found results for “

CVE-2025-25186

Good to know:

icon

Date: February 10, 2025

Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in "net-imap"'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed "uid-set" data which is automatically read by the client's receiver thread. The response parser uses "Range#to_a" to convert the "uid-set" data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.

Severity Score

Severity Score

Weakness Type (CWE)

Asymmetric Resource Consumption (Amplification)

CWE-405

Uncontrolled Resource Consumption

CWE-400

Improper Handling of Highly Compressed Data (Data Amplification)

CWE-409

Memory Allocation with Excessive Size Value

CWE-789

Allocation of Resources Without Limits or Throttling

CWE-770

Improper Validation of Specified Type of Input

CWE-1287

Top Fix

icon

Upgrade Version

Upgrade to version net-imap - 0.4.19;net-imap - 0.3.8;net-imap - 0.5.6

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): HIGH

Do you need more information?

Contact Us