CVE-2023-26434

Published Jun 20, 2023

Last updated 10 months ago

Overview

Description
When adding an external mail account, processing of POP3 "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue POP3 service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted POP3 server response to reasonable length/size. No publicly available exploits are known.
Source
security@open-xchange.com
NVD status
Modified

Risk scores

CVSS 3.1

Type
Primary
Base score
4.3
Impact score
1.4
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Severity
MEDIUM

Weaknesses

nvd@nist.gov
NVD-CWE-noinfo
security@open-xchange.com
CWE-400

Social media

Hype score
Not currently trending

Configurations