Описание
Apache James vulnerable to denial of service through JMAP HTML to text conversion
Apache James server JMAP HTML to text plain implementation in versions below 3.8.2 and 3.7.6 is subject to unbounded memory consumption that can result in a denial of service.
Users are recommended to upgrade to version 3.7.6 and 3.8.2, which fix this issue.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-45626
- https://github.com/apache/james-project/pull/1422
- https://github.com/apache/james-project/commit/372f1f83b6825fb0f92147803a9bf215b8ff690d
- https://github.com/apache/james-project/commit/537ae380f9837f74c075f0ed2b625affa9b20122
- https://lists.apache.org/thread/1fr9hvpsylomwwfr3rv82g84sxszn4kl
- http://www.openwall.com/lists/oss-security/2025/02/05/7
Пакеты
org.apache.james:james-server-jmap-draft
>= 3.8.0, < 3.8.2
3.8.2
org.apache.james:james-server-jmap-draft
< 3.7.6
3.7.6
Связанные уязвимости
Apache James server JMAP HTML to text plain implementation in versions below 3.8.2 and 3.7.6 is subject to unbounded memory consumption that can result in a denial of service. Users are recommended to upgrade to version 3.7.6 and 3.8.2, which fix this issue.
Уязвимость сервера программного обеспечения для развертывания и управления корпоративной почтой Apache James, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании