vulnerability
Exim: Insufficient Verification of Data Authenticity (CVE-2023-51766)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | 2023-12-24 | 2024-01-08 | 2025-01-28 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
2023-12-24
Added
2024-01-08
Modified
2025-01-28
Description
Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports . but some other popular e-mail servers do not.
Solution
exim-upgrade-4_97_1
References
- CVE-2023-51766
- https://attackerkb.com/topics/CVE-2023-51766
- URL-http://www.openwall.com/lists/oss-security/2023/12/24/1
- URL-http://www.openwall.com/lists/oss-security/2023/12/25/1
- URL-http://www.openwall.com/lists/oss-security/2023/12/29/2
- URL-http://www.openwall.com/lists/oss-security/2024/01/01/1
- URL-http://www.openwall.com/lists/oss-security/2024/01/01/2
- URL-http://www.openwall.com/lists/oss-security/2024/01/01/3
- URL-https://bugs.exim.org/show_bug.cgi?id=3063
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2255852
- URL-https://exim.org/static/doc/security/CVE-2023-51766.txt
- URL-https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html
- URL-https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca
- URL-https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5
- URL-https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766
- URL-https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/
- URL-https://lwn.net/Articles/956533/
- URL-https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
- URL-https://www.openwall.com/lists/oss-security/2023/12/23/2
- URL-https://www.youtube.com/watch?v=V8KPV96g1To

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.