Vulnerability Description
Amavis before 2.12.3 and 2.13.x before 2.13.1, in part because of its use of MIME-tools, has an Interpretation Conflict (relative to some mail user agents) when there are multiple boundary parameters in a MIME email message. Consequently, there can be an incorrect check for banned files or malware.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://gitlab.com/amavis/amavis/-/issues/112
- https://gitlab.com/amavis/amavis/-/raw/v2.13.1/README_FILES/README.CVE-2024-2805
- https://lists.amavis.org/pipermail/amavis-users/2024-March/006811.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://metacpan.org/pod/MIME::Tools
- https://www.amavis.org/release-notes.txt
- https://gitlab.com/amavis/amavis/-/issues/112
- https://gitlab.com/amavis/amavis/-/raw/v2.13.1/README_FILES/README.CVE-2024-2805
- https://lists.amavis.org/pipermail/amavis-users/2024-March/006811.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/[email protected]
FAQ
What is CVE-2024-28054?
CVE-2024-28054 is a vulnerability with a CVSS score of 7.4 (HIGH). Amavis before 2.12.3 and 2.13.x before 2.13.1, in part because of its use of MIME-tools, has an Interpretation Conflict (relative to some mail user agents) when there are multiple boundary parameters ...
How severe is CVE-2024-28054?
CVE-2024-28054 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-28054?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.