Skip to content

Commit bb40d28

Browse files
committed
cp {en,ko}/news/_posts/2025-04-28-dos-net-imap-cve-2025-43857.md
1 parent 8e3d312 commit bb40d28

File tree

1 file changed

+35
-0
lines changed

1 file changed

+35
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
layout: news_post
3+
title: "CVE-2025-43857: DoS vulnerability in net-imap"
4+
author: "nevans"
5+
translator:
6+
date: 2025-04-28 16:02:04 +0000
7+
tags: security
8+
lang: en
9+
---
10+
11+
There is a possibility for DoS by in the net-imap gem. This vulnerability has been assigned the CVE identifier [CVE-2025-43857]. We recommend upgrading the net-imap gem.
12+
13+
## Details
14+
15+
A malicious server can send can send a "literal" byte count which is automatically read by the client's receiver thread. The response reader immediately allocates memory for the number of bytes indicated by the server response. This should not be an issue when securely connecting to trusted IMAP servers that are well-behaved. It affects insecure connections and buggy, untrusted, or compromised servers (for example, connecting to a user supplied hostname).
16+
17+
Please update net-imap gem to version 0.2.5, 0.3.9, 0.4.20, 0.5.7, or later.
18+
19+
When connecting to untrusted servers or using an insecure connection, `max_response_size` and response handlers must be configured appropriately to limit memory consumption. See [GHSA-j3g3-5qv5-52mj] for more details.
20+
21+
## Affected versions
22+
23+
net-imap gem versions <= 0.2.4, 0.3.0 to 0.3.8, 0.4.0 to 0.4.19, and 0.5.0 to 0.5.6.
24+
25+
## Credits
26+
27+
Thanks to [Masamune] for discovering this issue.
28+
29+
## History
30+
31+
* Originally published at 2025-04-28 16:02:04 (UTC)
32+
33+
[CVE-2025-43857]: https://www.cve.org/CVERecord?id=CVE-2025-43857
34+
[GHSA-j3g3-5qv5-52mj]: https://github.com/ruby/net-imap/security/advisories/GHSA-j3g3-5qv5-52mj
35+
[Masamune]: https://hackerone.com/masamune_

0 commit comments

Comments
 (0)