Lucene search

K
cve[email protected]CVE-2023-29046
HistoryNov 02, 2023 - 2:15 p.m.

CVE-2023-29046

2023-11-0214:15:11
CWE-400
web.nvd.nist.gov
22
cve
2023
29046
data sources
e-mail
autoconfiguration
timeout
network resources
security vulnerability

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

4.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.5%

Connections to external data sources, like e-mail autoconfiguration, were not terminated in case they hit a timeout, instead those connections were logged. Some connections use user-controlled endpoints, which could be malicious and attempt to keep the connection open for an extended period of time. As a result users were able to trigger large amount of egress network connections, possibly exhausting network pool resources and lock up legitimate requests. A new mechanism has been introduced to cancel external connections that might access user-controlled endpoints. No publicly available exploits are known.

Affected configurations

NVD
Node
open-xchangeopen-xchange_appsuiteRange<7.10.6
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6-
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6069
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6073
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6080
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6085
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6093
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6102
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6112
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6121
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6133
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6138
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6141
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6146
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6147
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6148
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6150
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6156
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6161
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6166
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6173
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6176
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6178
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6189
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6194
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6199
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6204
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6205
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6209
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6210
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6214
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6215
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6216
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6218
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6219
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6220
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6227
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6230
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6233
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6235
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6236
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6239
OR
open-xchangeopen-xchange_appsuiteMatch7.10.6patch_release_6241

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "modules": [
      "backend"
    ],
    "product": "OX App Suite",
    "vendor": "OX Software GmbH",
    "versions": [
      {
        "lessThanOrEqual": "7.10.6-rev48",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "8.11",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

4.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.5%

Related for CVE-2023-29046