June 20, 2023, 8:15 a.m. |

National Vulnerability Database web.nvd.nist.gov

When adding an external mail account, processing of IMAP "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue IMAP service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted IMAP server response to reasonable length/size. No publicly available exploits are known.

access account capabilities cve exploits external imap length limit mail requests response rogue server service size trigger

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Information Security Senior Analyst

@ Media.Monks | Americas: USA + Canada

Senior Program Associate- Cybersecurity Awareness (Remote)

@ Fannie Mae | Washington, DC, United States

Cybersecurity Specialist - Endpoint Security

@ Hexagon US Federal | Huntsville, AL