We found results for “”
CVE-2025-25186
Good to know:
Date: February 10, 2025
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in "net-imap"'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed "uid-set" data which is automatically read by the client's receiver thread. The response parser uses "Range#to_a" to convert the "uid-set" data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.
Severity Score
Related Resources (12)
Severity Score
Weakness Type (CWE)
Asymmetric Resource Consumption (Amplification)
CWE-405Uncontrolled Resource Consumption
CWE-400Improper Handling of Highly Compressed Data (Data Amplification)
CWE-409Memory Allocation with Excessive Size Value
CWE-789Allocation of Resources Without Limits or Throttling
CWE-770Improper Validation of Specified Type of Input
CWE-1287Top Fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | NONE |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


