First published: Thu Sep 28 2023(Updated: )
[Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability]
Credit: zdi-disclosures@trendmicro.com zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Exim Exim | ||
ubuntu/exim4 | <4.90.1-1ubuntu1.10+ | 4.90.1-1ubuntu1.10+ |
ubuntu/exim4 | <4.93-13ubuntu1.8 | 4.93-13ubuntu1.8 |
ubuntu/exim4 | <4.95-4ubuntu2.3 | 4.95-4ubuntu2.3 |
ubuntu/exim4 | <4.96-14ubuntu1.2 | 4.96-14ubuntu1.2 |
ubuntu/exim4 | <4.96-17ubuntu2 | 4.96-17ubuntu2 |
ubuntu/exim4 | <4.82-3ubuntu2.4+ | 4.82-3ubuntu2.4+ |
ubuntu/exim4 | <4.96.1 | 4.96.1 |
ubuntu/exim4 | <4.86.2-2ubuntu2.6+ | 4.86.2-2ubuntu2.6+ |
debian/exim4 | <=4.92-8+deb10u6 | 4.92-8+deb10u9 4.94.2-7+deb11u2 4.96-15+deb12u4 4.97-8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42116 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Exim.
No, authentication is not required to exploit this vulnerability.
CVE-2023-42116 has a severity rating of 8.1 (high).
Versions 4.90.1-1ubuntu1.10+ to 4.96.1 of Exim are affected by CVE-2023-42116.
To fix CVE-2023-42116, update your Exim installation to version 4.90.1-1ubuntu1.10+ or higher.