ID CVE-2021-40110
Summary In Apache James, using Jazzer fuzzer, we identified that an IMAP user can craft IMAP LIST commands to orchestrate a Denial Of Service using a vulnerable Regular expression. This affected Apache James prior to 3.6.1 We recommend upgrading to Apache James 3.6.1 or higher , which enforce the use of RE2J regular expression engine to execute regex in linear time without back-tracking.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:james:-:*:*:*:*:*:*:*
    cpe:2.3:a:apache:james:-:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:james:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:james:2.2.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 12-01-2022 - 19:54)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
Last major update 12-01-2022 - 19:54
Published 04-01-2022 - 09:15
Last modified 12-01-2022 - 19:54
Back to Top