First published: Wed Feb 05 2025(Updated: )
Similarly to CVE-2024-34055, Apache James is vulnerable to denial of service through the abuse of IMAP literals from both authenticated and unauthenticated users, which could be used to cause unbounded memory allocation and very long computations Version 3.7.6 and 3.8.2 restrict such illegitimate use of IMAP literals.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache James | >=3.7.6<3.8.2 | |
maven/org.apache.james.protocols:protocols-imap | >=3.8.0<3.8.2 | 3.8.2 |
maven/org.apache.james.protocols:protocols-imap | <3.7.6 | 3.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37358 has been classified as a denial of service vulnerability that poses a high risk due to potential unbounded memory allocation.
To mitigate CVE-2024-37358, upgrade Apache James to version 3.8.2 or later, which includes restrictions to prevent the abuse of IMAP literals.
CVE-2024-37358 affects Apache James versions between 3.7.6 and 3.8.2.
CVE-2024-37358 can be exploited by both authenticated and unauthenticated users abusing IMAP literals to cause denial of service.
Exploiting CVE-2024-37358 can lead to service outages due to excessive memory usage and prolonged computations.