CVE-2025-43857

Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5, there is a possibility for denial of service by memory exhaustion when net-imap reads server responses. At any time while the client is connected, a malicious server can send can send a "literal" byte count, which is automatically read by the client's receiver thread. The response reader immediately allocates memory for the number of bytes indicated by the server response. This should not be an issue when securely connecting to trusted IMAP servers that are well-behaved. It can affect insecure connections and buggy, untrusted, or compromised servers (for example, connecting to a user supplied hostname). This issue has been patched in versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
GitHub_MCNA
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 25%
VendorProductVersion
ruby-langnet\
𝑥
< 0.2.5
ruby-langnet\
0.3.0 ≤
𝑥
< 0.3.9
ruby-langnet\
0.4.0 ≤
𝑥
< 0.4.20
ruby-langnet\
0.5.0 ≤
𝑥
< 0.5.7
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
jruby
plucky
needs-triage
oracular
ignored
noble
needs-triage
jammy
dne
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
needs-triage
ruby2.3
plucky
dne
oracular
dne
noble
dne
jammy
dne
focal
dne
xenial
not-affected
ruby2.5
plucky
dne
oracular
dne
noble
dne
jammy
dne
focal
dne
bionic
needs-triage
ruby2.7
plucky
dne
oracular
dne
noble
dne
jammy
dne
focal
needs-triage
ruby3.0
plucky
dne
oracular
dne
noble
dne
jammy
needs-triage
focal
dne
ruby3.2
plucky
dne
oracular
dne
noble
needs-triage
jammy
dne
focal
dne
ruby3.3
plucky
needs-triage
oracular
ignored
noble
dne
jammy
dne
focal
dne