CVE-2024-31399

Excessive platform resource consumption within a loop issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerability is exploited, processing a crafted mail may cause a denial-of-service (DoS) condition.
References
Link Resource
https://cs.cybozu.co.jp/2024/007901.html Vendor Advisory
https://jvn.jp/en/jp/JVN28869536/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*

History

23 Aug 2024, 02:32

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References () https://cs.cybozu.co.jp/2024/007901.html - () https://cs.cybozu.co.jp/2024/007901.html - Vendor Advisory
References () https://jvn.jp/en/jp/JVN28869536/ - () https://jvn.jp/en/jp/JVN28869536/ - Third Party Advisory
First Time Cybozu garoon
Cybozu
CPE cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*

11 Jun 2024, 13:54

Type Values Removed Values Added
Summary
  • (es) Existe un consumo excesivo de recursos de la plataforma dentro de un problema de bucle en Cybozu Garoon 5.0.0 a 5.15.2. Si se aprovecha esta vulnerabilidad, el procesamiento de un correo manipulado puede provocar una condición de denegación de servicio (DoS).

11 Jun 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-11 06:15

Updated : 2024-08-23 02:32


NVD link : CVE-2024-31399

Mitre link : CVE-2024-31399

CVE.ORG link : CVE-2024-31399


JSON object : View

Products Affected

cybozu

  • garoon