Vulnerability CVE-2023-26434


Published: 2023-06-20

Description:
When adding an external mail account, processing of POP3 "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue POP3 service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted POP3 server response to reasonable length/size. No publicly available exploits are known.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
OX App Suite SSRF / Resource Consumption / Command Injection
Mehmet Ince
22.06.2023

 References:
https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6219_7.10.6_2023-03-20.pdf

Copyright 2024, cxsecurity.com

 

Back to Top