Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-25186

Опубликовано: 10 фев. 2025
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in net-imap's response parser. At any time while the client is connected, a malicious server can send can send highly compressed uid-set data which is automatically read by the client's receiver thread. The response parser uses Range#to_a to convert the uid-set data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.

A flaw was found in Ruby's net-imap library. In certain versions, there is a possibility for denial of service by memory exhaustion in the net-imap response parser. At any time while the client is connected, a malicious server can send highly compressed uid-set data, which is automatically read by the client's receiver thread. The response parser converts the uid-set data into arrays of integers with no limitation on the expanded size of the ranges, which can trigger memory exhaustion.

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a net-imap vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform enforces process separation, preventing one process from over-allocating memory and affecting the stability or security of others. This mitigates the risk of denial-of-service attacks and memory-based exploits. A defense-in-depth monitoring strategy—including perimeter firewalls and endpoint protection services—detects excessive memory usage and enables automated or manual responses to prevent resource exhaustion. Additionally, memory protection mechanisms reduce the likelihood of buffer overflows, crashes, and unauthorized memory access.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 23scale-amp-zync-containerAffected
Red Hat Enterprise Linux 10rhel10-beta/flatpak-sdkAffected
Red Hat Enterprise Linux 6rubyOut of support scope
Red Hat Enterprise Linux 7rubyOut of support scope
Red Hat Enterprise Linux 8ruby:2.5/rubyOut of support scope
Red Hat Enterprise Linux 8ruby:3.1/rubyOut of support scope
Red Hat Enterprise Linux 8ruby:3.3/rubyOut of support scope
Red Hat Enterprise Linux 9rhel9/ruby-30Not affected
Red Hat Enterprise Linux 9rhel9/ruby-31Not affected
Red Hat Enterprise Linux 9rhel9/ruby-33Affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1287
Дефект:
CWE-400
Дефект:
CWE-405
Дефект:
CWE-409
Дефект:
CWE-770
Дефект:
CWE-789
https://bugzilla.redhat.com/show_bug.cgi?id=2344680net-imap: Net::IMAP vulnerable to possible DoS by memory exhaustion

EPSS

Процентиль: 50%
0.00268
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
4 месяца назад

Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.

CVSS3: 6.5
nvd
4 месяца назад

Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.

CVSS3: 6.5
msrc
2 месяца назад

Описание отсутствует

CVSS3: 6.5
debian
4 месяца назад

Net::IMAP implements Internet Message Access Protocol (IMAP) client fu ...

CVSS3: 6.5
github
4 месяца назад

Possible DoS by memory exhaustion in net-imap

EPSS

Процентиль: 50%
0.00268
Низкий

6.5 Medium

CVSS3