Memory Consumption Vulnerability in Apache James Server
CVE-2024-45626

7.5HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
6 February 2025

What is CVE-2024-45626?

CVE-2024-45626 is a memory consumption vulnerability found in the Apache James Server, a widely used mail and messaging server that facilitates the development and deployment of email-based applications. This vulnerability affects specific versions of the server, leading to unbounded memory consumption, which can ultimately result in a denial of service. Organizations relying on Apache James Server for email services may face significant operational disruptions if this vulnerability is exploited, as it could render their email functionalities inoperable.

Technical Details

The underlying issue is in the JMAP HTML to text plain conversion implementation of the Apache James Server. Versions prior to 3.8.2 and 3.7.6 are susceptible to this vulnerability, which allows a malicious actor to manipulate the conversion process to consume excessive memory resources. The potential for resource exhaustion through crafted inputs means that once the server’s memory limit is reached, the server may crash or become unresponsive.

Potential Impact of CVE-2024-45626

  1. Denial of Service: The primary risk associated with CVE-2024-45626 is the potential for denial of service, where the server becomes unresponsive due to excessive memory usage. This can prevent legitimate users from accessing email services, severely disrupting organizational communications.

  2. Operational Disruptions: A successful exploitation of this vulnerability may lead to prolonged downtime for organizations that depend on the Apache James Server for their email operations. This could result in significant business interruptions, loss of productivity, and potential financial consequences.

  3. Reputation Damage: Persistent issues with email service availability can damage an organization's reputation, leading to a loss of customer trust. This could have long-term implications, particularly for businesses that operate in sectors where communication reliability is critical.

Affected Version(s)

Apache James server 3.8.0 <= 3.8.1

Apache James server 0 <= 3.7.5

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Benoit TELLIER
Wojciech Kapcia
.