Description
When adding an external mail account, processing of POP3 "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue POP3 service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted POP3 server response to reasonable length/size. No publicly available exploits are known.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-30254 | When adding an external mail account, processing of POP3 "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue POP3 service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted POP3 server response to reasonable length/size. No publicly available exploits are known. |
References
History
No history.
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2024-08-02T11:46:24.577Z
Reserved: 2023-02-22T20:42:56.089Z
Link: CVE-2023-26434
No data.
Status : Modified
Published: 2023-06-20T08:15:09.487
Modified: 2024-11-21T07:51:26.267
Link: CVE-2023-26434
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD