Описание
Possible DoS by memory exhaustion in net-imap
Summary
There is a possibility for denial of service by memory exhaustion in net-imap
's response parser. At any time while the client is connected, a malicious server can send can send highly compressed uid-set
data which is automatically read by the client's receiver thread. The response parser uses Range#to_a
to convert the uid-set
data into arrays of integers, with no limitation on the expanded size of the ranges.
Details
IMAP's uid-set
and sequence-set
formats can compress ranges of numbers, for example: "1,2,3,4,5"
and "1:5"
both represent the same set. When Net::IMAP::ResponseParser
receives APPENDUID
or COPYUID
response codes, it expands each uid-set
into an array of integers. On a 64 bit system, these arrays will expand to 8 bytes for each number in the set. A malicious IMAP server may send specially crafted APPENDUID
or COPYUID
responses with very large uid-set
ranges.
The Net::IMAP
client parses each server response in a separate thread, as soon as each responses is received from the server. This attack works even when the client does not handle the APPENDUID
or COPYUID
responses.
Malicious inputs:
Simple way to test this:
Fixes
Preferred Fix, minor API changes
Upgrade to v0.4.19, v0.5.6, or higher, and configure:
This replaces UIDPlusData
with AppendUIDData
and CopyUIDData
. These classes store their UIDs as Net::IMAP::SequenceSet
objects (not expanded into arrays of integers). Code that does not handle APPENDUID
or COPYUID
responses will not notice any difference. Code that does handle these responses may need to be updated. See the documentation for UIDPlusData, AppendUIDData and CopyUIDData.
For v0.3.8, this option is not available.
For v0.4.19, the default value is true
.
For v0.5.6, the default value is :up_to_max_size
.
For v0.6.0, the only allowed value will be false
(UIDPlusData
will be removed from v0.6).
Mitigation, backward compatible API
Upgrade to v0.3.8, v0.4.19, v0.5.6, or higher.
For backward compatibility, uid-set
can still be expanded into an array, but a maximum limit will be applied.
Assign config.parser_max_deprecated_uidplus_data_size
to set the maximum UIDPlusData
UID set size.
When config.parser_use_deprecated_uidplus_data == true
, larger sets will raise Net::IMAP::ResponseParseError
.
When config.parser_use_deprecated_uidplus_data == :up_to_max_size
, larger sets will use AppendUIDData
or CopyUIDData
.
For v0.3,8, this limit is hard-coded to 10,000, and larger sets will always raise Net::IMAP::ResponseParseError
.
For v0.4.19, the limit defaults to 1000.
For v0.5.6, the limit defaults to 100.
For v0.6.0, the limit will be ignored (UIDPlusData
will be removed from v0.6).
Please Note: unhandled responses
If the client does not add response handlers to prune unhandled responses, a malicious server can still eventually exhaust all client memory, by repeatedly sending malicious responses. However, net-imap
has always retained unhandled responses, and it has always been necessary for long-lived connections to prune these responses. This is not significantly different from connecting to a trusted server with a long-lived connection. To limit the maximum number of retained responses, a simple handler might look something like the following:
Proof of concept
Save the following to a ruby file (e.g: poc.rb
) and make it executable:
Use ulimit
to limit the process's virtual memory. The following example limits virtual memory to 1GB:
Ссылки
- https://github.com/ruby/net-imap/security/advisories/GHSA-7fc5-f82f-cx69
- https://nvd.nist.gov/vuln/detail/CVE-2025-25186
- https://github.com/ruby/net-imap/commit/70e3ddd071a94e450b3238570af482c296380b35
- https://github.com/ruby/net-imap/commit/c8c5a643739d2669f0c9a6bb9770d0c045fd74a3
- https://github.com/ruby/net-imap/commit/cb92191b1ddce2d978d01b56a0883b6ecf0b1022
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/net-imap/CVE-2025-25186.yml
- https://ruby.github.io/net-imap/Net/IMAP/AppendUIDData.html
- https://ruby.github.io/net-imap/Net/IMAP/CopyUIDData.html
- https://ruby.github.io/net-imap/Net/IMAP/UIDPlusData.html
Пакеты
net-imap
>= 0.3.2, < 0.3.8
0.3.8
net-imap
>= 0.4.0, < 0.4.19
0.4.19
net-imap
>= 0.5.0, < 0.5.6
0.5.6
EPSS
6 Medium
CVSS4
6.5 Medium
CVSS3
CVE ID
Дефекты
Связанные уязвимости
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.
Net::IMAP implements Internet Message Access Protocol (IMAP) client fu ...
EPSS
6 Medium
CVSS4
6.5 Medium
CVSS3