{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "description", "text": "An excessive memory use issue (CWE-770) exists in Email-MIME, before version 1.954, which can cause denial of service when parsing multipart MIME messages. The patch set (from 2020 and 2024) limits excessive depth and the total number of parts.", "title": "Vulnerability Description" } ], "publisher": { "category": "other", "contact_details": "gdt@cpan.org", "name": "giterlizzi", "namespace": "https://github.com/giterlizzi/" }, "references": [ { "category": "self", "summary": "CPANSA-Email-MIME-2024-4140 JSON", "url": "https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2024/cpansa-email-mime-2024-4140.json" }, { "category": "external", "summary": "https://bugs.debian.org/960062", "url": "https://bugs.debian.org/960062" }, { "category": "external", "summary": "https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2", "url": "https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2" }, { "category": "external", "summary": "https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8", "url": "https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8" }, { "category": "external", "summary": "https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531", "url": "https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531" }, { "category": "external", "summary": "https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d", "url": "https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d" }, { "category": "external", "summary": "https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1", "url": "https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1" }, { "category": "external", "summary": "https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63", "url": "https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63" }, { "category": "external", "summary": "https://github.com/rjbs/Email-MIME/issues/66", "url": "https://github.com/rjbs/Email-MIME/issues/66" }, { "category": "external", "summary": "https://github.com/rjbs/Email-MIME/pull/80", "url": "https://github.com/rjbs/Email-MIME/pull/80" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4140", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4140" }, { "category": "external", "summary": "CVE-2024-4140 (NVD)", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4140" } ], "title": "Email-MIME vulnerability", "tracking": { "current_release_date": "2024-05-02T00:00:00", "generator": { "engine": { "name": "CSAF Perl Toolkit", "version": "0.26" } }, "id": "CPANSA-Email-MIME-2024-4140", "initial_release_date": "2024-05-02T00:00:00", "revision_history": [ { "date": "2024-05-02T00:00:00", "number": "1", "summary": "First release" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:cpan/<1.954", "product": { "name": "Email-MIME less than 1.954", "product_id": "CSAFPID-0001" } }, { "category": "product_version_range", "name": "vers:cpan/>=1.954", "product": { "name": "Email-MIME greater than or equal 1.954", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Email-MIME" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-4140", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "description", "text": "An excessive memory use issue (CWE-770) exists in Email-MIME, before version 1.954, which can cause denial of service when parsing multipart MIME messages. The patch set (from 2020 and 2024) limits excessive depth and the total number of parts.", "title": "Vulnerability Description" } ], "product_status": { "fixed": [ "CSAFPID-0002" ], "known_affected": [ "CSAFPID-0001" ] }, "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] } ] }