CVE-2025-43857

EUVD-2025-12559
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5, there is a possibility for denial of service by memory exhaustion when net-imap reads server responses. At any time while the client is connected, a malicious server can send can send a "literal" byte count, which is automatically read by the client's receiver thread. The response reader immediately allocates memory for the number of bytes indicated by the server response. This should not be an issue when securely connecting to trusted IMAP servers that are well-behaved. It can affect insecure connections and buggy, untrusted, or compromised servers (for example, connecting to a user supplied hostname). This issue has been patched in versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
Affected Products (NVD)
VendorProductVersion
ruby-langnet\
𝑥
< 0.2.5
ruby-langnet\
0.3.0 ≤
𝑥
< 0.3.9
ruby-langnet\
0.4.0 ≤
𝑥
< 0.4.20
ruby-langnet\
0.5.0 ≤
𝑥
< 0.5.7
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby2.3
focal
dne
jammy
dne
noble
dne
oracular
dne
plucky
dne
questing
dne
xenial
not-affected
ruby2.5
bionic
needs-triage
focal
dne
jammy
dne
noble
dne
oracular
dne
plucky
dne
questing
dne
ruby2.7
focal
needs-triage
jammy
dne
noble
dne
oracular
dne
plucky
dne
questing
dne
ruby3.0
focal
dne
jammy
needs-triage
noble
dne
oracular
dne
plucky
dne
questing
dne
ruby3.2
focal
dne
jammy
dne
noble
needs-triage
oracular
dne
plucky
dne
questing
dne
ruby3.3
focal
dne
jammy
dne
noble
dne
oracular
ignored
plucky
ignored
questing
needs-triage
jruby
bionic
needs-triage
focal
needs-triage
jammy
dne
noble
needs-triage
oracular
ignored
plucky
ignored
questing
needs-triage
trusty
needs-triage
xenial
needs-triage