CPANSA-Email-MIME-2024-4140: Email-MIME vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2024-05-02T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2024-05-02T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | 7.5 | Severity | |
Original language | Language | en | |
Also referred to |
Vulnerability Description
An excessive memory use issue (CWE-770) exists in Email-MIME, before version 1.954, which can cause denial of service when parsing multipart MIME messages. The patch set (from 2020 and 2024) limits excessive depth and the total number of parts.
Vulnerabilities
CVE-2024-4140
Vulnerability DescriptionAn excessive memory use issue (CWE-770) exists in Email-MIME, before version 1.954, which can cause denial of service when parsing multipart MIME messages. The patch set (from 2020 and 2024) limits excessive depth and the total number of parts.
Weakness | CWE-770 : Allocation of Resources Without Limits or Throttling |
---|
Product status
Known affected
Product | Score | ||||||||
---|---|---|---|---|---|---|---|---|---|
Email-MIME less than 1.954 |
|
Fixed
- Email-MIME greater than or equal 1.954
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-Email-MIME-2024-4140 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2024/cpansa-email-mime-2024-4140.json - https://bugs.debian.org/960062 external
https://bugs.debian.org/960062 - https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2 external
https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2 - https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8 external
https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8 - https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531 external
https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531 - https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d external
https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d - https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1 external
https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1 - https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63 external
https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63 - https://github.com/rjbs/Email-MIME/issues/66 external
https://github.com/rjbs/Email-MIME/issues/66 - https://github.com/rjbs/Email-MIME/pull/80 external
https://github.com/rjbs/Email-MIME/pull/80 - https://www.cve.org/CVERecord?id=CVE-2024-4140 external
https://www.cve.org/CVERecord?id=CVE-2024-4140 - CVE-2024-4140 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2024-4140
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Thu May 2 00:00:00 2024 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/