CVE-2021-40111

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-40111
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-40111.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-40111
Aliases
Related
Published
2022-01-04T09:15:07Z
Modified
2024-09-03T03:56:08.469333Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs to be authenticated to exploit this vulnerability. This affected Apache James prior to version 3.6.1. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade.

References

Affected packages

Git / github.com/apache/james-project

Affected ranges

Type
GIT
Repo
https://github.com/apache/james-project
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

cassandra_migration_v1_to_v2

james-project-3.*

james-project-3.0-beta5
james-project-3.0.0
james-project-3.0.0-RC1
james-project-3.0.0-beta5
james-project-3.3.0
james-project-3.4.0
james-project-3.6.0

pre-3.*

pre-3.1.0