First published: Sun Dec 24 2023(Updated: )
Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/exim4 | <4.90.1-1ubuntu1.10+ | 4.90.1-1ubuntu1.10+ |
ubuntu/exim4 | <4.93-13ubuntu1.10 | 4.93-13ubuntu1.10 |
ubuntu/exim4 | <4.95-4ubuntu2.5 | 4.95-4ubuntu2.5 |
ubuntu/exim4 | <4.96-17ubuntu2.2 | 4.96-17ubuntu2.2 |
ubuntu/exim4 | <4.97-3 | 4.97-3 |
ubuntu/exim4 | <4.97-3 | 4.97-3 |
ubuntu/exim4 | <4.86.2-2ubuntu2.6+ | 4.86.2-2ubuntu2.6+ |
debian/exim4 | 4.94.2-7+deb11u2 4.94.2-7+deb11u3 4.96-15+deb12u4 4.96-15+deb12u5 4.98-1 | |
sa-exim | <4.97.1 | |
Fedora EPEL | =7.0 | |
Fedora EPEL | =8.0 | |
Fedora EPEL | =9.0 | |
Fedora | =38 | |
Fedora | =39 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51766 is considered a high severity vulnerability due to its potential to allow remote attackers to bypass SPF mechanisms.
To fix CVE-2023-51766, upgrade Exim to version 4.97.1 or later.
CVE-2023-51766 affects Exim versions prior to 4.97.1 across multiple operating systems including various Ubuntu and Debian releases.
Yes, CVE-2023-51766 can allow unauthorized email sending by enabling spoofed MAIL FROM addresses.
In addition to upgrading Exim, implementing strict email validation and monitoring SMTP traffic can help mitigate CVE-2023-51766.