2024-12-08 03:06:42 +00:00

68 lines
3.1 KiB
JSON

{
"id": "CVE-2024-23184",
"sourceIdentifier": "security@open-xchange.com",
"published": "2024-09-10T15:15:14.763",
"lastModified": "2024-11-21T08:57:08.740",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Having a large number of address headers (From, To, Cc, Bcc, etc.) becomes excessively CPU intensive. With 100k header lines CPU usage is already 12 seconds, and in a production environment we observed 500k header lines taking 18 minutes to parse. Since this can be triggered by external actors sending emails to a victim, this is a security issue. An external attacker can send specially crafted messages that consume target system resources and cause outage. One can implement restrictions on address headers on MTA component preceding Dovecot. No publicly available exploits are known."
},
{
"lang": "es",
"value": "Tener una gran cantidad de encabezados de direcciones (De, Para, Cc, Cco, etc.) hace que el uso de la CPU sea excesivamente intensivo. Con 100.000 l\u00edneas de encabezado, el uso de la CPU ya es de 12 segundos, y en un entorno de producci\u00f3n observamos que 500.000 l\u00edneas de encabezado tardaban 18 minutos en analizarse. Dado que esto puede ser provocado por actores externos que env\u00edan correos electr\u00f3nicos a una v\u00edctima, se trata de un problema de seguridad. Un atacante externo puede enviar mensajes especialmente manipulados que consumen recursos del sistema de destino y provocan una interrupci\u00f3n del servicio. Se pueden implementar restricciones en los encabezados de direcciones en el componente MTA anterior a Dovecot. No se conocen exploits disponibles p\u00fablicamente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@open-xchange.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@open-xchange.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2024/oxdc-adv-2024-0002.json",
"source": "security@open-xchange.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Aug/17",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/08/15/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}