CVE-2024-4140

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-4140
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-4140.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-4140
Related
Published
2024-05-02T20:15:07Z
Modified
2024-10-12T11:27:58.110052Z
Summary
[none]
Details

An excessive memory use issue (CWE-770) exists in Email-MIME, before version 1.954, which can cause denial of service when parsing multipart MIME messages. The patch set (from 2020 and 2024) limits excessive depth and the total number of parts.

References

Affected packages

Debian:11 / libemail-mime-perl

Package

Name
libemail-mime-perl
Purl
pkg:deb/debian/libemail-mime-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.949-1
1.952-1
1.953-1
1.954-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libemail-mime-perl

Package

Name
libemail-mime-perl
Purl
pkg:deb/debian/libemail-mime-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.953-1
1.954-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libemail-mime-perl

Package

Name
libemail-mime-perl
Purl
pkg:deb/debian/libemail-mime-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.954-1

Affected versions

1.*

1.953-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/rjbs/email-mime

Affected ranges

Type
GIT
Repo
https://github.com/rjbs/email-mime
Events

Affected versions

1.*

1.862
1.863
1.900
1.901
1.902
1.903
1.904
1.905
1.906
1.907
1.908
1.909
1.910
1.911
1.912_01
1.920
1.921
1.922
1.923
1.924
1.925
1.926
1.927
1.928
1.929
1.930
1.931
1.932
1.933
1.934
1.935
1.936
1.937
1.938
1.939
1.940
1.941
1.942
1.943
1.944
1.945
1.946