Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mcWd3LTZxajUtOGhtcM0gyA
Infinite Loop in Apache James
In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs to be authenticated to exploit this vulnerability. This affected Apache James prior to version 3.6.1. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade.
Permalink: https://github.com/advisories/GHSA-fqgw-6qj5-8hmpJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mcWd3LTZxajUtOGhtcM0gyA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: about 1 year ago
Identifiers: GHSA-fqgw-6qj5-8hmp, CVE-2021-40111
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-40111
- https://www.openwall.com/lists/oss-security/2022/01/04/3
- http://www.openwall.com/lists/oss-security/2022/01/04/3
- https://github.com/advisories/GHSA-fqgw-6qj5-8hmp
Affected Packages
maven:org.apache.james:james-server
Dependent packages: 1Dependent repositories: 15
Downloads:
Affected Version Ranges: < 3.6.1
Fixed in: 3.6.1
All affected versions: 3.0.0, 3.0.1, 3.1.0, 3.2.0, 3.3.0, 3.4.0, 3.5.0, 3.6.0
All unaffected versions: 3.6.2, 3.7.0, 3.7.1, 3.7.2, 3.7.3, 3.7.4, 3.7.5, 3.8.0, 3.8.1