Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-23184

Опубликовано: 15 авг. 2024
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Having a large number of address headers (From, To, Cc, Bcc, etc.) becomes excessively CPU intensive. With 100k header lines CPU usage is already 12 seconds, and in a production environment we observed 500k header lines taking 18 minutes to parse. Since this can be triggered by external actors sending emails to a victim, this is a security issue. An external attacker can send specially crafted messages that consume target system resources and cause outage. One can implement restrictions on address headers on MTA component preceding Dovecot. No publicly available exploits are known.

A flaw was found in Dovecot. Processing a large number of address headers (From, To, Cc, Bcc, etc) can be excessively CPU intensive. This flaw allows a remote attacker to trigger a denial of service.

Отчет

This issue is classified as moderate severity rather than important because, while it can result in significant performance degradation (e.g., high CPU usage and delays in processing emails with an excessive number of address headers), it does not directly compromise the confidentiality, integrity, or availability of the system in a critical way. The vulnerability primarily affects resource consumption (CPU time), which can lead to a potential denial-of-service (DoS) scenario, but only under specific conditions that require a large volume of headers to be processed. Moreover, the issue can be mitigated by setting limits on the number of address headers in the MTA, reducing the likelihood of exploitation.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10dovecotNot affected
Red Hat Enterprise Linux 6dovecotOut of support scope
Red Hat Enterprise Linux 7dovecotOut of support scope
Red Hat Enterprise Linux 8dovecotFixedRHSA-2024:697324.09.2024
Red Hat Enterprise Linux 9dovecotFixedRHSA-2024:652910.09.2024
Red Hat Enterprise Linux 9.2 Extended Update SupportdovecotFixedRHSA-2024:646509.09.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2305909dovecot: using a large number of address headers may trigger a denial of service

EPSS

Процентиль: 43%
0.00209
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5
ubuntu
11 месяцев назад

Having a large number of address headers (From, To, Cc, Bcc, etc.) becomes excessively CPU intensive. With 100k header lines CPU usage is already 12 seconds, and in a production environment we observed 500k header lines taking 18 minutes to parse. Since this can be triggered by external actors sending emails to a victim, this is a security issue. An external attacker can send specially crafted messages that consume target system resources and cause outage. One can implement restrictions on address headers on MTA component preceding Dovecot. No publicly available exploits are known.

CVSS3: 5
nvd
11 месяцев назад

Having a large number of address headers (From, To, Cc, Bcc, etc.) becomes excessively CPU intensive. With 100k header lines CPU usage is already 12 seconds, and in a production environment we observed 500k header lines taking 18 minutes to parse. Since this can be triggered by external actors sending emails to a victim, this is a security issue. An external attacker can send specially crafted messages that consume target system resources and cause outage. One can implement restrictions on address headers on MTA component preceding Dovecot. No publicly available exploits are known.

CVSS3: 5
debian
11 месяцев назад

Having a large number of address headers (From, To, Cc, Bcc, etc.) bec ...

CVSS3: 5
github
11 месяцев назад

Having a large number of address headers (From, To, Cc, Bcc, etc.) becomes excessively CPU intensive. With 100k header lines CPU usage is already 12 seconds, and in a production environment we observed 500k header lines taking 18 minutes to parse. Since this can be triggered by external actors sending emails to a victim, this is a security issue. An external attacker can send specially crafted messages that consume target system resources and cause outage. One can implement restrictions on address headers on MTA component preceding Dovecot. No publicly available exploits are known.

CVSS3: 6.5
fstec
12 месяцев назад

Уязвимость почтового сервера Dovecot, связанная с неограниченным распределением ресурсов, позволяющая нарушителю выполнить отказ в обслуживании

EPSS

Процентиль: 43%
0.00209
Низкий

6.5 Medium

CVSS3