CVE-2023-42116
Publication date 28 September 2023
Last updated 24 July 2024
Ubuntu priority
Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-17515.
Status
Package | Ubuntu Release | Status |
---|---|---|
exim4 | ||
22.04 LTS jammy |
Fixed 4.95-4ubuntu2.3
|
|
20.04 LTS focal |
Fixed 4.93-13ubuntu1.8
|
|
18.04 LTS bionic |
Fixed 4.90.1-1ubuntu1.10+esm1
|
|
16.04 LTS xenial |
Fixed 4.86.2-2ubuntu2.6+esm4
|
|
14.04 LTS trusty |
Fixed 4.82-3ubuntu2.4+esm6
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
eslerm
no security patches available, see ZDI's timeline
allenpthuang
patches now available, see the thread on Openwall
References
Related Ubuntu Security Notices (USN)
- USN-6411-1
- Exim vulnerabilities
- 4 October 2023