First published: Tue Jun 20 2023(Updated: )
When adding an external mail account, processing of SMTP "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue SMTP service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted SMTP server response to reasonable length/size. No publicly available exploits are known.
Credit: security@open-xchange.com security@open-xchange.com
Affected Software | Affected Version | How to fix |
---|---|---|
<7.10.6 | ||
>=8.0.0<8.11.0 | ||
=7.10.6 | ||
=7.10.6-revision_39 | ||
Open-xchange Open-xchange Appsuite Backend | <7.10.6 | |
Open-xchange Open-xchange Appsuite Backend | >=8.0.0<8.11.0 | |
Open-xchange Open-xchange Appsuite Backend | =7.10.6 | |
Open-xchange Open-xchange Appsuite Backend | =7.10.6-revision_39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26432 is a vulnerability that allows an attacker to trigger requests that lead to excessive resource usage and service unavailability in Open-xchange Appsuite Backend.
CVE-2023-26432 affects Open-xchange Appsuite Backend versions up to 7.10.6 and versions 8.0.0 to 8.11.0.
The severity of CVE-2023-26432 is medium, with a severity value of 4.3.
An attacker with access to a rogue SMTP service could trigger requests that lead to excessive resource usage and service unavailability.
To mitigate CVE-2023-26432, it is recommended to update Open-xchange Appsuite Backend to a version that includes the necessary fix.