Severity
6.5MEDIUMNVD
OSV5.3
EPSS
0.1%
top 66.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 10
Latest updateApr 27

Description

Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set`

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages6 packages

RubyGemsruby/net-imap0.3.20.3.8+2
CVEListV5ruby/net-imap>= 0.3.2, < 0.3.8, >= 0.4.0, < 0.4.19, >= 0.5.0, < 0.5.6+2
debiandebian/ruby3.1< ruby3.3 3.3.8-1 (forky)
debiandebian/ruby3.3< ruby3.3 3.3.8-1 (forky)

🔴Vulnerability Details

4
OSV
ruby2.7, ruby3.0, ruby3.2, ruby3.3 vulnerabilities2025-04-07
OSV
CVE-2025-25186: Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby2025-02-10
GHSA
Possible DoS by memory exhaustion in net-imap2025-02-10
OSV
Possible DoS by memory exhaustion in net-imap2025-02-10

📋Vendor Advisories

4
Ubuntu
Ruby vulnerabilities2025-04-07
Microsoft
Net::IMAP vulnerable to possible DoS by memory exhaustion2025-02-11
Red Hat
net-imap: Net::IMAP vulnerable to possible DoS by memory exhaustion2025-02-10
Debian
CVE-2025-25186: ruby3.1 - Net::IMAP implements Internet Message Access Protocol (IMAP) client functionalit...2025

💬Community

1
HackerOne
Possible DoS by memory exhaustion in net/imap2025-04-27