CVE-2025-25186

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-25186
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-25186.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-25186
Aliases
Downstream
Related
Published
2025-02-10T15:55:56Z
Modified
2025-10-10T08:27:06.731936Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Net::IMAP vulnerable to possible DoS by memory exhaustion
Details

Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in net-imap's response parser. At any time while the client is connected, a malicious server can send can send highly compressed uid-set data which is automatically read by the client's receiver thread. The response parser uses Range#to_a to convert the uid-set data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.

References

Affected packages

Git / github.com/ruby/net-imap

Affected ranges

Type
GIT
Repo
https://github.com/ruby/net-imap
Events
Type
GIT
Repo
https://github.com/ruby/net-imap
Events
Type
GIT
Repo
https://github.com/ruby/net-imap
Events

Affected versions

v0.*

v0.3.2
v0.3.3
v0.3.4
v0.3.5
v0.3.6
v0.3.7
v0.4.0
v0.4.1
v0.4.10
v0.4.11
v0.4.12
v0.4.13
v0.4.14
v0.4.15
v0.4.16
v0.4.17
v0.4.18
v0.4.2
v0.4.3
v0.4.4
v0.4.5
v0.4.6
v0.4.7
v0.4.8
v0.4.9
v0.5.0
v0.5.1
v0.5.2
v0.5.3
v0.5.4
v0.5.5