When adding an external mail account, processing of POP3 "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue POP3 service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted POP3 server response to reasonable length/size. No publicly available exploits are known.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-30254 When adding an external mail account, processing of POP3 "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue POP3 service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted POP3 server response to reasonable length/size. No publicly available exploits are known.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2024-08-02T11:46:24.577Z

Reserved: 2023-02-22T20:42:56.089Z

Link: CVE-2023-26434

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-06-20T08:15:09.487

Modified: 2024-11-21T07:51:26.267

Link: CVE-2023-26434

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses