Lucene search

K
mageiaGentoo FoundationMGASA-2024-0198
HistoryMay 29, 2024 - 9:08 p.m.

Updated perl-Email-MIME packages fix security vulnerabilities

2024-05-2921:08:09
Gentoo Foundation
advisories.mageia.org
11
email-mime
security vulnerabilities
excessive memory use
denial of service
cwe-770
patch set
2020
2024
multipart mime messages
cve-2024-4140
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.3%

An excessive memory use issue (CWE-770) exists in Email-MIME, before version 1.954, which can cause denial of service when parsing multipart MIME messages. The patch set (from 2020 and 2024) limits excessive depth and the total number of parts. (CVE-2024-4140)

OSVersionArchitecturePackageVersionFilename
Mageia9noarchperl-email-mime< 1.954.0-1perl-Email-MIME-1.954.0-1.mga9

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.3%