Логотип exploitDog
bind:CVE-2023-26432
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-26432

Количество 2

Количество 2

nvd логотип

CVE-2023-26432

больше 2 лет назад

When adding an external mail account, processing of SMTP "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue SMTP service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted SMTP server response to reasonable length/size. No publicly available exploits are known.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-9628-xx9p-xjqj

больше 2 лет назад

When adding an external mail account, processing of SMTP "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue SMTP service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted SMTP server response to reasonable length/size. No publicly available exploits are known.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-26432

When adding an external mail account, processing of SMTP "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue SMTP service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted SMTP server response to reasonable length/size. No publicly available exploits are known.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-9628-xx9p-xjqj

When adding an external mail account, processing of SMTP "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue SMTP service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted SMTP server response to reasonable length/size. No publicly available exploits are known.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу