Skip to content

Commit 8e3d312

Browse files
nevanshsbt
authored andcommitted
Add CVE-2025-43857: DoS vulnerability in net-imap
1 parent 9f1d0f0 commit 8e3d312

File tree

1 file changed

+35
-0
lines changed

1 file changed

+35
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
layout: news_post
3+
title: "CVE-2025-43857: DoS vulnerability in net-imap"
4+
author: "nevans"
5+
translator:
6+
date: 2025-04-28 16:02:04 +0000
7+
tags: security
8+
lang: en
9+
---
10+
11+
There is a possibility for DoS by in the net-imap gem. This vulnerability has been assigned the CVE identifier [CVE-2025-43857]. We recommend upgrading the net-imap gem.
12+
13+
## Details
14+
15+
A malicious server can send can send a "literal" byte count which is automatically read by the client's receiver thread. The response reader immediately allocates memory for the number of bytes indicated by the server response. This should not be an issue when securely connecting to trusted IMAP servers that are well-behaved. It affects insecure connections and buggy, untrusted, or compromised servers (for example, connecting to a user supplied hostname).
16+
17+
Please update net-imap gem to version 0.2.5, 0.3.9, 0.4.20, 0.5.7, or later.
18+
19+
When connecting to untrusted servers or using an insecure connection, `max_response_size` and response handlers must be configured appropriately to limit memory consumption. See [GHSA-j3g3-5qv5-52mj] for more details.
20+
21+
## Affected versions
22+
23+
net-imap gem versions <= 0.2.4, 0.3.0 to 0.3.8, 0.4.0 to 0.4.19, and 0.5.0 to 0.5.6.
24+
25+
## Credits
26+
27+
Thanks to [Masamune] for discovering this issue.
28+
29+
## History
30+
31+
* Originally published at 2025-04-28 16:02:04 (UTC)
32+
33+
[CVE-2025-43857]: https://www.cve.org/CVERecord?id=CVE-2025-43857
34+
[GHSA-j3g3-5qv5-52mj]: https://github.com/ruby/net-imap/security/advisories/GHSA-j3g3-5qv5-52mj
35+
[Masamune]: https://hackerone.com/masamune_

0 commit comments

Comments
 (0)