CVE-2025-59045 (CNNVD-202509-1504)

HIGH
中文标题:
stalwart 安全漏洞
英文标题:
Stalwart vulnerable to Memory Exhaustion via CalDAV Event Expansion
CVSS分数: 7.1
发布时间: 2025-09-10 16:09:49
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

stalwart是Stalwart Labs开源的一个多功能邮件和协作服务器。 stalwart 0.12.0至0.13.3之前版本存在安全漏洞,该漏洞源于CalDAV实现中存在内存耗尽问题,可能导致拒绝服务攻击。

英文描述:

Stalwart is a mail and collaboration server. Starting in version 0.12.0 and prior to version 0.13.3, a memory exhaustion vulnerability exists in Stalwart's CalDAV implementation that allows authenticated attackers to cause denial-of-service by triggering unbounded memory consumption through recurring event expansion. An authenticated attacker can crash the Stalwart server by creating recurring events with large payloads and triggering their expansion through CalDAV REPORT requests. A single malicious request expanding 300 events with 1000-character descriptions can consume up to 2 GB of memory. The vulnerability exists in the `ArchivedCalendarEventData.expand` function, which processes CalDAV `REPORT` requests with event expansion. When a client requests recurring events in their expanded form using the `<C:expand>` element, the server stores all expanded event instances in memory without enforcing size limits. Users should upgrade to Stalwart version 0.13.3 or later to receive a fix. If immediate upgrading is not possible, implement memory limits at the container/system level; monitor server memory usage for unusual spikes; consider rate limiting CalDAV REPORT requests; and restrict CalDAV access to trusted users only.

CWE类型:
CWE-770
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
stalwartlabs stalwart >= 0.12.0, < 0.13.3 - - cpe:2.3:a:stalwartlabs:stalwart:>=_0.12.0,_<_0.13.3:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/stalwartlabs/stalwart/security/advisories/GHSA-xv4r-q6gr-6pfg x_refsource_CONFIRM
cve.org
访问
https://github.com/stalwartlabs/stalwart/commit/15762fba2ba335e560b8d25f71af085a8b6b6cf2 x_refsource_MISC
cve.org
访问
https://github.com/stalwartlabs/stalwart/blob/main/CHANGELOG.md x_refsource_MISC
cve.org
访问
https://github.com/stalwartlabs/stalwart/releases/tag/v0.13.3 x_refsource_MISC
cve.org
访问
https://tools.ietf.org/html/rfc4791 x_refsource_MISC
cve.org
访问
CVSS评分详情
4.0 (cna)
HIGH
7.1
CVSS向量: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
机密性
NONE
完整性
NONE
可用性
HIGH
后续系统影响 (Subsequent):
机密性
NONE
完整性
NONE
可用性
NONE
时间信息
发布时间:
2025-09-10 16:09:49
修改时间:
2025-09-11 13:28:45
创建时间:
2025-11-11 15:40:46
更新时间:
2025-11-11 16:00:10
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-59045 2025-11-11 15:23:31 2025-11-11 07:40:46
NVD nvd_CVE-2025-59045 2025-11-11 15:01:02 2025-11-11 07:48:33
CNNVD cnnvd_CNNVD-202509-1504 2025-11-11 15:12:56 2025-11-11 08:00:10
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:10
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202509-1504; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202509-1504
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:33
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']