First published: Wed Mar 26 2025(Updated: )
It was discovered that Exim incorrectly handled certain memory operations. A remote attacker could use this issue to cause Exim to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/exim4 | <4.98-1ubuntu2.1 | 4.98-1ubuntu2.1 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/exim4-base | <4.98-1ubuntu2.1 | 4.98-1ubuntu2.1 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/eximon4 | <4.98-1ubuntu2.1 | 4.98-1ubuntu2.1 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/exim4 | <4.97-4ubuntu4.3 | 4.97-4ubuntu4.3 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/exim4-base | <4.97-4ubuntu4.3 | 4.97-4ubuntu4.3 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/eximon4 | <4.97-4ubuntu4.3 | 4.97-4ubuntu4.3 |
Ubuntu | =24.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7373-1 is critical due to the potential for denial of service and arbitrary code execution.
To fix USN-7373-1, upgrade Exim to version 4.98-1ubuntu2.1 or 4.97-4ubuntu4.3, depending on your Ubuntu version.
USN-7373-1 affects Ubuntu 24.04 and 24.10 installations running Exim versions prior to the patched updates.
Yes, USN-7373-1 can lead to a denial of service, which may cause downtime for services that rely on Exim.
While USN-7373-1 primarily poses a risk of denial of service, exploitation could potentially lead to data loss depending on the attack vector.