漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
net-imap rubygem vulnerable to possible DoS by memory exhaustion
Vulnerability Description
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5, there is a possibility for denial of service by memory exhaustion when net-imap reads server responses. At any time while the client is connected, a malicious server can send can send a "literal" byte count, which is automatically read by the client's receiver thread. The response reader immediately allocates memory for the number of bytes indicated by the server response. This should not be an issue when securely connecting to trusted IMAP servers that are well-behaved. It can affect insecure connections and buggy, untrusted, or compromised servers (for example, connecting to a user supplied hostname). This issue has been patched in versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5.
CVSS Information
N/A
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Vulnerability Title
Net::IMAP 安全漏洞
Vulnerability Description
Net::IMAP是Ruby开源的一个消息访问协议的 Ruby 客户端 api。 Net::IMAP存在安全漏洞,该漏洞源于服务器响应处理不当导致内存耗尽,可能导致拒绝服务。以下版本受到影响:0.5.7之前版本、0.4.20之前版本、0.3.9之前版本和0.2.5之前版本。
CVSS Information
N/A
Vulnerability Type
N/A