You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in "net-imap"'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed "uid-set" data which is automatically read by the client's receiver thread. The response parser uses "Range#to_a" to convert the "uid-set" data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.
CVE-2025-25186 - Medium Severity Vulnerability
Ruby client api for Internet Message Access Protocol
Library home page: https://rubygems.org/gems/net-imap-0.5.5.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /Gemfile.lock
Dependency Hierarchy:
Found in base branch: master
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in "net-imap"'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed "uid-set" data which is automatically read by the client's receiver thread. The response parser uses "Range#to_a" to convert the "uid-set" data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.
Publish Date: 2025-02-10
URL: CVE-2025-25186
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-7fc5-f82f-cx69
Release Date: 2025-02-10
Fix Resolution: net-imap - 0.3.8,0.4.19,0.5.6
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: