First published: Sun Dec 24 2023(Updated: )
Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exim Exim | <4.97.1 | |
Fedoraproject Extra Packages For Enterprise Linux | =7.0 | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Fedoraproject Extra Packages For Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
Debian Debian Linux | =10.0 | |
ubuntu/exim4 | <4.90.1-1ubuntu1.10+ | 4.90.1-1ubuntu1.10+ |
ubuntu/exim4 | <4.93-13ubuntu1.10 | 4.93-13ubuntu1.10 |
ubuntu/exim4 | <4.95-4ubuntu2.5 | 4.95-4ubuntu2.5 |
ubuntu/exim4 | <4.96-17ubuntu2.2 | 4.96-17ubuntu2.2 |
ubuntu/exim4 | <4.97-3 | 4.97-3 |
ubuntu/exim4 | <4.97-3 | 4.97-3 |
ubuntu/exim4 | <4.86.2-2ubuntu2.6+ | 4.86.2-2ubuntu2.6+ |
debian/exim4 | 4.94.2-7+deb11u2 4.94.2-7+deb11u3 4.96-15+deb12u4 4.96-15+deb12u5 4.98-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.