CVE-2024-4140
Email-MIME Excessive Memory Parsing Denial of Service
Description
An excessive memory use issue (CWE-770) exists in Email-MIME, before version 1.954, which can cause denial of service when parsing multipart MIME messages. The patch set (from 2020 and 2024) limits excessive depth and the total number of parts.
INFO
Published Date :
May 2, 2024, 8:15 p.m.
Last Modified :
Aug. 26, 2025, 5:21 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CVSS Scores
Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|---|
CVSS 3.1 | HIGH | [email protected] |
Solution
- There is no known solution at this time.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-4140
.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-4140
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-4140
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-4140
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2024-4140
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Aug. 26, 2025
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:a:rjbs:email-mime:*:*:*:*:*:*:*:* versions up to (excluding) 1.954 Added CPE Configuration OR *cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* *cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* Added Reference Type CVE: https://bugs.debian.org/960062 Types: Mailing List Added Reference Type Canonical Ltd.: https://bugs.debian.org/960062 Types: Mailing List Added Reference Type CVE: https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2 Types: Patch Added Reference Type Canonical Ltd.: https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2 Types: Patch Added Reference Type CVE: https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8 Types: Patch Added Reference Type Canonical Ltd.: https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8 Types: Patch Added Reference Type CVE: https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531 Types: Patch Added Reference Type Canonical Ltd.: https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531 Types: Patch Added Reference Type CVE: https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d Types: Patch Added Reference Type Canonical Ltd.: https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d Types: Patch Added Reference Type CVE: https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1 Types: Patch Added Reference Type Canonical Ltd.: https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1 Types: Patch Added Reference Type CVE: https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63 Types: Patch Added Reference Type Canonical Ltd.: https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63 Types: Patch Added Reference Type CVE: https://github.com/rjbs/Email-MIME/issues/66 Types: Issue Tracking Added Reference Type Canonical Ltd.: https://github.com/rjbs/Email-MIME/issues/66 Types: Issue Tracking Added Reference Type CVE: https://github.com/rjbs/Email-MIME/pull/80 Types: Issue Tracking Added Reference Type Canonical Ltd.: https://github.com/rjbs/Email-MIME/pull/80 Types: Issue Tracking Added Reference Type CVE: https://lists.fedoraproject.org/archives/list/[email protected]/message/UFD5BWGYAVLW6IO4SUNLTJCFFLHZYQGT/ Types: Mailing List Added Reference Type Canonical Ltd.: https://lists.fedoraproject.org/archives/list/[email protected]/message/UFD5BWGYAVLW6IO4SUNLTJCFFLHZYQGT/ Types: Mailing List Added Reference Type CVE: https://lists.fedoraproject.org/archives/list/[email protected]/message/YHXHDLPZ6JV4KK3Q43O6TE3WOBAIUQRC/ Types: Mailing List Added Reference Type Canonical Ltd.: https://lists.fedoraproject.org/archives/list/[email protected]/message/YHXHDLPZ6JV4KK3Q43O6TE3WOBAIUQRC/ Types: Mailing List Added Reference Type CVE: https://www.cve.org/CVERecord?id=CVE-2024-4140 Types: Third Party Advisory Added Reference Type Canonical Ltd.: https://www.cve.org/CVERecord?id=CVE-2024-4140 Types: Third Party Advisory -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://bugs.debian.org/960062 Added Reference https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2 Added Reference https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8 Added Reference https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531 Added Reference https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d Added Reference https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1 Added Reference https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63 Added Reference https://github.com/rjbs/Email-MIME/issues/66 Added Reference https://github.com/rjbs/Email-MIME/pull/80 Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/UFD5BWGYAVLW6IO4SUNLTJCFFLHZYQGT/ Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/YHXHDLPZ6JV4KK3Q43O6TE3WOBAIUQRC/ Added Reference https://www.cve.org/CVERecord?id=CVE-2024-4140 -
CVE Modified by [email protected]
Jun. 10, 2024
Action Type Old Value New Value Added Reference Canonical Ltd. https://lists.fedoraproject.org/archives/list/[email protected]/message/UFD5BWGYAVLW6IO4SUNLTJCFFLHZYQGT/ [No types assigned] Added Reference Canonical Ltd. https://lists.fedoraproject.org/archives/list/[email protected]/message/YHXHDLPZ6JV4KK3Q43O6TE3WOBAIUQRC/ [No types assigned] -
CVE Modified by [email protected]
May. 14, 2024
Action Type Old Value New Value -
CVE Modified by [email protected]
May. 02, 2024
Action Type Old Value New Value Added Reference Canonical Ltd. https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8 [No types assigned] Added Reference Canonical Ltd. https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d [No types assigned] Added Reference Canonical Ltd. https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2 [No types assigned] Added Reference Canonical Ltd. https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63 [No types assigned] Added Reference Canonical Ltd. https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1 [No types assigned] Added Reference Canonical Ltd. https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531 [No types assigned] -
CVE Received by [email protected]
May. 02, 2024
Action Type Old Value New Value Added Description An excessive memory use issue (CWE-770) exists in Email-MIME, before version 1.954, which can cause denial of service when parsing multipart MIME messages. The patch set (from 2020 and 2024) limits excessive depth and the total number of parts. Added Reference Canonical Ltd. https://github.com/rjbs/Email-MIME/issues/66 [No types assigned] Added Reference Canonical Ltd. https://github.com/rjbs/Email-MIME/pull/80 [No types assigned] Added Reference Canonical Ltd. https://bugs.debian.org/960062 [No types assigned] Added Reference Canonical Ltd. https://www.cve.org/CVERecord?id=CVE-2024-4140 [No types assigned] Added CWE Canonical Ltd. CWE-770 Added CVSS V3.1 Canonical Ltd. AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H