First published: Wed Jun 05 2024(Updated: )
Cyrus IMAP before 3.8.3 and 3.10.x before 3.10.0-rc1 allows authenticated attackers to cause unbounded memory allocation by sending many LITERALs in a single command.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cyrus imap | <3.8.3 | 3.8.3 |
redhat/cyrus imap | <3.10.0 | 3.10.0 |
debian/cyrus-imapd | <=3.2.6-2+deb11u2<=3.2.6-2+deb11u4 | 3.6.1-4+deb12u3 3.6.1-4+deb12u2 3.10.1-1 |
Cyrus SASL | <3.8.3 | |
Cyrus SASL | =3.10.0-alpha0 | |
Cyrus SASL | =3.10.0-beta1 | |
Cyrus SASL | =3.10.0-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34055 has a high severity rating due to the potential for unbounded memory allocation leading to denial of service.
To fix CVE-2024-34055, upgrade to Cyrus IMAP version 3.8.3 or 3.10.0-rc1 or later.
CVE-2024-34055 allows authenticated attackers to exploit the vulnerability to exhaust system memory, potentially causing service disruptions.
CVE-2024-34055 affects Cyrus IMAP versions before 3.8.3 and 3.10.x before 3.10.0-rc1.
Authenticated users of Cyrus IMAP versions before 3.8.3 and 3.10.x before 3.10.0-rc1 are vulnerable to CVE-2024-34055.