First published: Tue Jun 20 2023(Updated: )
When adding an external mail account, processing of POP3 "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue POP3 service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted POP3 server response to reasonable length/size. No publicly available exploits are known.
Credit: security@open-xchange.com security@open-xchange.com
Affected Software | Affected Version | How to fix |
---|---|---|
<7.10.6 | ||
=7.10.6 | ||
=7.10.6-revision_39 | ||
Open-xchange Open-xchange Appsuite Backend | <7.10.6 | |
Open-xchange Open-xchange Appsuite Backend | =7.10.6 | |
Open-xchange Open-xchange Appsuite Backend | =7.10.6-revision_39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26434 is a vulnerability that allows an attacker with access to a rogue POP3 service to trigger requests that lead to excessive resource usage and service unavailability.
The severity of CVE-2023-26434 is medium with a CVSS score of 4.3.
Open-xchange Open-xchange Appsuite Backend versions up to and including 7.10.6 and 7.10.6-revision_39 are affected by CVE-2023-26434.
An attacker with access to a rogue POP3 service can exploit CVE-2023-26434 by triggering requests that cause excessive resource usage and service unavailability.
Yes, updating to a version of Open-xchange Open-xchange Appsuite Backend that is higher than 7.10.6-revision_39 will fix CVE-2023-26434.