First published: Mon Jan 29 2024(Updated: )
It was discovered that Exim incorrectly handled certain requests. A remote attacker could possibly use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/exim4 | <4.96-17ubuntu2.2 | 4.96-17ubuntu2.2 |
Ubuntu Ubuntu | =23.10 | |
All of | ||
ubuntu/exim4-base | <4.96-17ubuntu2.2 | 4.96-17ubuntu2.2 |
Ubuntu Ubuntu | =23.10 | |
All of | ||
ubuntu/eximon4 | <4.96-17ubuntu2.2 | 4.96-17ubuntu2.2 |
Ubuntu Ubuntu | =23.10 | |
All of | ||
ubuntu/exim4 | <4.95-4ubuntu2.5 | 4.95-4ubuntu2.5 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/exim4-base | <4.95-4ubuntu2.5 | 4.95-4ubuntu2.5 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/eximon4 | <4.95-4ubuntu2.5 | 4.95-4ubuntu2.5 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/exim4 | <4.93-13ubuntu1.10 | 4.93-13ubuntu1.10 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/exim4-base | <4.93-13ubuntu1.10 | 4.93-13ubuntu1.10 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/eximon4 | <4.93-13ubuntu1.10 | 4.93-13ubuntu1.10 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/exim4 | <4.90.1-1ubuntu1.10+esm3 | 4.90.1-1ubuntu1.10+esm3 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/exim4-base | <4.90.1-1ubuntu1.10+esm3 | 4.90.1-1ubuntu1.10+esm3 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/eximon4 | <4.90.1-1ubuntu1.10+esm3 | 4.90.1-1ubuntu1.10+esm3 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/exim4 | <4.86.2-2ubuntu2.6+esm6 | 4.86.2-2ubuntu2.6+esm6 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/exim4-base | <4.86.2-2ubuntu2.6+esm6 | 4.86.2-2ubuntu2.6+esm6 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/eximon4 | <4.86.2-2ubuntu2.6+esm6 | 4.86.2-2ubuntu2.6+esm6 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.