
The Apache James (Java Apache Mail Enterprise Server) mail server, a widely used open-source solution, has been found to be vulnerable to two distinct denial-of-service (DoS) attacks. These vulnerabilities, tracked as CVE-2024-45626 and CVE-2024-37358, could allow malicious actors to disrupt email services by overwhelming the server with malicious requests.
The first vulnerability, CVE-2024-45626, resides in the JMAP (JSON Meta Application Protocol) HTML to text conversion functionality. Versions of Apache James prior to 3.8.2 and 3.7.6 are susceptible to unbounded memory consumption. An attacker exploiting this flaw could send specially crafted emails or JMAP requests that trigger excessive memory allocation during the HTML to text conversion process. This, in turn, can lead to a denial of service, effectively shutting down the mail server.
The second vulnerability, CVE-2024-37358, involves the abuse of IMAP (Internet Message Access Protocol) literals. Similar to a previously reported issue (CVE-2024-34055), this flaw allows both authenticated and unauthenticated users to trigger a DoS attack. By sending a flood of IMAP requests with carefully constructed literals, attackers can force the server to perform unbounded memory allocation and excessively long computations, again leading to a service outage.
These vulnerabilities pose a significant risk to organizations relying on Apache James for their email infrastructure. A successful attack could disrupt critical communication channels, impacting business operations and potentially causing data loss.
The Apache James development team has acted swiftly to address these issues. Patches have been released in versions 3.8.2 and 3.7.6, which contain the necessary fixes. Users of affected versions are strongly urged to upgrade to the latest release as soon as possible to protect their systems. Administrators should also review their firewall rules and access controls to minimize the risk of exploitation.