org.apache.james:james-server-protocols-imap4@3.2.0 vulnerabilities

  • latest version

    3.8.1

  • first published

    12 years ago

  • latest version published

    1 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.james:james-server-protocols-imap4 package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Denial of Service (DoS)

    Affected versions of this package are vulnerable to Denial of Service (DoS) through the abuse of IMAP literals. An attacker can cause unbounded memory allocation and very long computations by sending specially crafted IMAP literals.

    How to fix Denial of Service (DoS)?

    Upgrade org.apache.james:james-server-protocols-imap4 to version 3.7.6, 3.8.2 or higher.

    [,3.7.6)[3.8.0,3.8.2)
    • M
    Information Exposure

    Affected versions of this package are vulnerable to Information Exposure such that using temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit.

    Note: Vulnerable components include the SMTP stack and IMAP APPEND command.

    How to fix Information Exposure?

    Upgrade org.apache.james:james-server-protocols-imap4 to version 3.7.3 or higher.

    [0,3.7.3)
    • H
    Command Injection

    Affected versions of this package are vulnerable to Command Injection leading to a buffering attack relying on the use of the STARTTLS command. This vulnerability exists due to an improper fix of CVE-2021-38542, which solved a similar problem but is subject to a parser differential and improper handling of concurrent requests.

    How to fix Command Injection?

    Upgrade org.apache.james:james-server-protocols-imap4 to version 3.7.1 or higher.

    [,3.7.1)