Home

Description

Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. From versions 0.4.0 to before 0.4.24, 0.5.0 to before 0.5.14, and 0.6.0 to before 0.6.4, when authenticating a connection with SCRAM-SHA1 or SCRAM-SHA256, a hostile server can perform a computational denial-of-service attack on the client process by sending a big iteration count value. This issue has been patched in versions 0.4.24, 0.5.14, and 0.6.4.

PUBLISHED Reserved 2026-04-26 | Published 2026-05-09 | Updated 2026-05-09 | Assigner GitHub_M




MEDIUM: 6.0CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-1322: Use of Blocking Code in Single-threaded, Non-blocking Context

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

>= 0.4.0, < 0.4.24
affected

>= 0.5.0, < 0.5.14
affected

>= 0.6.0, < 0.6.4
affected

References

github.com/...t-imap/security/advisories/GHSA-87pf-fpwv-p7m7

github.com/...ommit/158d0b505074397cdb5ceb58935e42dd2bcfa612

github.com/...ommit/808001bc45c06f7297a7e96d341279e041a7f7f4

github.com/...ommit/99f59eab6064955a23debd95410263ad144df758

github.com/ruby/net-imap/releases/tag/v0.4.24

github.com/ruby/net-imap/releases/tag/v0.5.14

github.com/ruby/net-imap/releases/tag/v0.6.4

cve.org (CVE-2026-42256)

nvd.nist.gov (CVE-2026-42256)

Download JSON