Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.
History

Thu, 17 Apr 2025 05:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat logging
CPEs cpe:/a:redhat:logging:5.9::el9
Vendors & Products Redhat
Redhat logging

Wed, 12 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 12 Feb 2025 13:45:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 10 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Description Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.
Title Net::IMAP vulnerable to possible DoS by memory exhaustion
Weaknesses CWE-1287
CWE-400
CWE-405
CWE-409
CWE-770
CWE-789
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-12T15:46:11.581Z

Reserved: 2025-02-03T19:30:53.399Z

Link: CVE-2025-25186

cve-icon Vulnrichment

Updated: 2025-02-12T15:45:53.825Z

cve-icon NVD

Status : Received

Published: 2025-02-10T16:15:39.457

Modified: 2025-02-10T16:15:39.457

Link: CVE-2025-25186

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-02-10T15:55:56Z

Links: CVE-2025-25186 - Bugzilla