Users are recommended to upgrade to version 3.7.6 and 3.8.2, which fix this issue.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-4972 | Apache James server JMAP HTML to text plain implementation in versions below 3.8.2 and 3.7.6 is subject to unbounded memory consumption that can result in a denial of service. Users are recommended to upgrade to version 3.7.6 and 3.8.2, which fix this issue. |
Github GHSA |
GHSA-57m2-h3fw-rxhw | Apache James vulnerable to denial of service through JMAP HTML to text conversion |
Tue, 11 Feb 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache james Server |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:apache:james_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache james Server |
Thu, 06 Feb 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 06 Feb 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Apache James server JMAP HTML to text plain implementation in versions below 3.8.2 and 3.7.6 is subject to unbounded memory consumption that can result in a denial of service. Users are recommended to upgrade to version 3.7.6 and 3.8.2, which fix this issue. | |
| Title | Apache James: denial of service through JMAP HTML to text conversion | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-12T19:51:10.343Z
Reserved: 2024-09-03T08:43:52.113Z
Link: CVE-2024-45626
No data.
Status : Analyzed
Published: 2025-02-06T12:15:27.110
Modified: 2025-02-11T16:12:04.307
Link: CVE-2024-45626
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA