CVE-2025-43857
Publication date 28 April 2025
Last updated 14 May 2025
Ubuntu priority
Cvss 3 Severity Score
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5, there is a possibility for denial of service by memory exhaustion when net-imap reads server responses. At any time while the client is connected, a malicious server can send can send a "literal" byte count, which is automatically read by the client's receiver thread. The response reader immediately allocates memory for the number of bytes indicated by the server response. This should not be an issue when securely connecting to trusted IMAP servers that are well-behaved. It can affect insecure connections and buggy, untrusted, or compromised servers (for example, connecting to a user supplied hostname). This issue has been patched in versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5.
Read the notes from the security team
Why is this CVE low priority?
Only a memory consumption issue when connecting to untrusted IMAP servers
Status
Package | Ubuntu Release | Status |
---|---|---|
jruby | 25.04 plucky |
Needs evaluation
|
24.10 oracular |
Needs evaluation
|
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy | Not in release | |
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty |
Needs evaluation
|
|
ruby2.3 | 25.04 plucky | Not in release |
24.10 oracular | Not in release | |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
16.04 LTS xenial |
Needs evaluation
|
|
ruby2.5 | 25.04 plucky | Not in release |
24.10 oracular | Not in release | |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Needs evaluation
|
|
ruby2.7 | 25.04 plucky | Not in release |
24.10 oracular | Not in release | |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal |
Needs evaluation
|
|
ruby3.0 | 25.04 plucky | Not in release |
24.10 oracular | Not in release | |
24.04 LTS noble | Not in release | |
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal | Not in release | |
ruby3.2 | 25.04 plucky | Not in release |
24.10 oracular | Not in release | |
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
ruby3.3 | 25.04 plucky |
Needs evaluation
|
24.10 oracular |
Needs evaluation
|
|
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release |
Notes
mdeslaur
ruby3.0 contains net-imap 0.1.1 ruby3.2 contains net-imap 0.3.4.1 ruby3.3 contains net-imap 0.4.9.1 This fix introduces a new max_response_size to the API, but does not set a limited default to remain backwards compatible. Adding the upstream fix to stable releases will not result in this CVE being mitigated without individual applications using the API to be modified to use the new parameter. In addition, there are still other ways a malicious server could cause memory consumption on clients. Since this issue is only a memory consumption issue when connecting to untrusted servers via IMAP, and since the upstream fix doesn't actually change behaviour and would also require software using net-imap to use the new option, marking this CVE as being low priority.
Patch details
Package | Patch details |
---|---|
ruby3.0 | |
ruby3.2 | |
ruby3.3 |
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |