First published: Tue Aug 10 2021(Updated: )
The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exim Exim | <=4.94.2 | |
ubuntu/exim4 | <4.90.1-1ubuntu1.10+ | 4.90.1-1ubuntu1.10+ |
ubuntu/exim4 | <4.93-13ubuntu1.11 | 4.93-13ubuntu1.11 |
ubuntu/exim4 | <4.82-3ubuntu2.4+ | 4.82-3ubuntu2.4+ |
ubuntu/exim4 | <4.95 | 4.95 |
ubuntu/exim4 | <4.86.2-2ubuntu2.6+ | 4.86.2-2ubuntu2.6+ |
debian/exim4 | <=4.94.2-7+deb11u3 | 4.96-15+deb12u5 4.98-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38371 is a vulnerability in Exim, a popular mail transfer agent software, that allows response injection (buffering) during MTA SMTP sending.
CVE-2021-38371 has a high severity with a CVSS score of 7.5.
CVE-2021-38371 affects Exim versions up to and including 4.94.2, exposing them to response injection (buffering) during MTA SMTP sending.
To fix CVE-2021-38371, users are advised to update their Exim software to version 4.94.3 or later, which includes a patch for this vulnerability.
More information about CVE-2021-38371 can be found on the official Exim website and the CVE-2021-38371.txt security advisory.