cve/2024/CVE-2024-37358.md

19 lines
954 B
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-37358](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37358)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20James%20server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.8.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&color=brightgreen)
### Description
Similarly to CVE-2024-34055, Apache James is vulnerable to denial of service through the abuse of IMAP literals from both authenticated and unauthenticated users, which could be used to cause unbounded memory allocation and very long computationsVersion 3.7.6 and 3.8.2 restrict such illegitimate use of IMAP literals.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cve-scores