Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
02 Feb 2024, 02:22
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
References | () https://www.youtube.com/watch?v=V8KPV96g1To - Exploit | |
References | () https://lwn.net/Articles/956533/ - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/ - Mailing List, Third Party Advisory | |
First Time |
Debian
Debian debian Linux |
|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
18 Jan 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Jan 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Jan 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Jan 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Jan 2024, 16:23
Type | Values Removed | Values Added |
---|---|---|
First Time |
Exim
Fedoraproject fedora Fedoraproject Exim exim Fedoraproject extra Packages For Enterprise Linux |
|
References | () https://bugs.exim.org/show_bug.cgi?id=3063 - Issue Tracking, Vendor Advisory | |
References | () https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca - Patch | |
References | () https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html - Technical Description | |
References | () https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/01/01/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/12/24/1 - Mailing List, Third Party Advisory | |
References | () https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ - Technical Description, Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2023/12/23/2 - Issue Tracking, Mailing List, Third Party Advisory | |
References | () https://exim.org/static/doc/security/CVE-2023-51766.txt - Broken Link | |
References | () http://www.openwall.com/lists/oss-security/2024/01/01/1 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/01/01/3 - Mailing List, Third Party Advisory | |
References | () https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766 - Mitigation, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/12/29/2 - Mailing List, Mitigation, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/12/25/1 - Mailing List, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2255852 - Issue Tracking, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
CPE | cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:9.0:*:*:*:*:*:*:* |
|
CWE | CWE-345 |
02 Jan 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Jan 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Jan 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not. |
29 Dec 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Dec 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Dec 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Exim through 4.97 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not. | |
References |
|
24 Dec 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Dec 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-24 06:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-51766
Mitre link : CVE-2023-51766
CVE.ORG link : CVE-2023-51766
JSON object : View
Products Affected
exim
- exim
debian
- debian_linux
fedoraproject
- fedora
- extra_packages_for_enterprise_linux
CWE
CWE-345
Insufficient Verification of Data Authenticity