First published: Tue Jun 11 2024(Updated: )
Excessive platform resource consumption within a loop issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerability is exploited, processing a crafted mail may cause a denial-of-service (DoS) condition.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Cybozu Garoon | >=5.0.0<=5.15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31399 is rated as a high-severity vulnerability due to its potential to cause a denial-of-service condition.
To fix CVE-2024-31399, upgrade Cybozu Garoon to a version later than 5.15.2.
CVE-2024-31399 affects Cybozu Garoon versions from 5.0.0 to 5.15.2.
CVE-2024-31399 can facilitate a denial-of-service (DoS) attack through excessive platform resource consumption.
You can identify if your system is vulnerable to CVE-2024-31399 by checking if you are using Cybozu Garoon version between 5.0.0 and 5.15.2.