When adding an external mail account, processing of SMTP "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue SMTP service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted SMTP server response to reasonable length/size. No publicly available exploits are known.
Metrics
Affected Vendors & Products
References
History
Tue, 03 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: OX
Published: 2023-06-20T07:51:47.213Z
Updated: 2024-12-03T15:17:39.153Z
Reserved: 2023-02-22T20:42:56.089Z
Link: CVE-2023-26432
Vulnrichment
Updated: 2024-08-02T11:46:24.644Z
NVD
Status : Modified
Published: 2023-06-20T08:15:09.360
Modified: 2024-11-21T07:51:25.920
Link: CVE-2023-26432
Redhat
No data.