org.apache.james:james-server-protocols-imap4@3.7.1 vulnerabilities

  • latest version

    3.8.1

  • first published

    12 years ago

  • latest version published

    1 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.james:james-server-protocols-imap4 package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Denial of Service (DoS)

    Affected versions of this package are vulnerable to Denial of Service (DoS) through the abuse of IMAP literals. An attacker can cause unbounded memory allocation and very long computations by sending specially crafted IMAP literals.

    How to fix Denial of Service (DoS)?

    Upgrade org.apache.james:james-server-protocols-imap4 to version 3.7.6, 3.8.2 or higher.

    [,3.7.6)[3.8.0,3.8.2)
    • M
    Information Exposure

    Affected versions of this package are vulnerable to Information Exposure such that using temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit.

    Note: Vulnerable components include the SMTP stack and IMAP APPEND command.

    How to fix Information Exposure?

    Upgrade org.apache.james:james-server-protocols-imap4 to version 3.7.3 or higher.

    [0,3.7.3)