CVE Vulnerabilities

CVE-2021-33582

Inefficient Algorithmic Complexity

Published: Sep 01, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Cyrus IMAP before 3.4.2 allows remote attackers to cause a denial of service (multiple-minute daemon hang) via input that is mishandled during hash-table interaction. Because there are many insertions into a single bucket, strcmp becomes slow. This is fixed in 3.4.2, 3.2.8, and 3.0.16.

Weakness

An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached.

Affected Software

NameVendorStart VersionEnd Version
ImapCyrus*3.0.16 (excluding)
ImapCyrus3.2.0 (including)3.2.8 (excluding)
ImapCyrus3.4.0 (including)3.4.2 (excluding)
Red Hat Enterprise Linux 8RedHatcyrus-imapd-0:3.0.7-20.el8_4.1*
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHatcyrus-imapd-0:3.0.7-16.el8_1.1*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatcyrus-imapd-0:3.0.7-16.el8_2.1*
Cyrus-imapdUbuntubionic*
Cyrus-imapdUbuntuesm-apps/bionic*
Cyrus-imapdUbuntuesm-apps/focal*
Cyrus-imapdUbuntufocal*
Cyrus-imapdUbuntutrusty*
Cyrus-imapdUbuntuupstream*
Cyrus-imapdUbuntuxenial*
Cyrus-imapd-2.4Ubuntuesm-apps/xenial*
Cyrus-imapd-2.4Ubuntutrusty*
Cyrus-imapd-2.4Ubuntuupstream*
Cyrus-imapd-2.4Ubuntuxenial*

References