9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
32.5%
Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This
vulnerability allows remote attackers to execute arbitrary code on affected
installations of Exim. Authentication is not required to exploit this
vulnerability. The specific flaw exists within the smtp service, which
listens on TCP port 25 by default. The issue results from the lack of
proper validation of user-supplied data, which can result in a write past
the end of a buffer. An attacker can leverage this vulnerability to execute
code in the context of the service account. Was ZDI-CAN-17434.
Author | Note |
---|---|
eslerm | no security patches available, see ZDI’s timeline |
allenpthuang | patches now available, see the thread on Openwall |
launchpad.net/bugs/cve/CVE-2023-42115
nvd.nist.gov/vuln/detail/CVE-2023-42115
security-tracker.debian.org/tracker/CVE-2023-42115
ubuntu.com/security/notices/USN-6411-1
www.cve.org/CVERecord?id=CVE-2023-42115
www.openwall.com/lists/oss-security/2023/10/02/3
www.zerodayinitiative.com/advisories/ZDI-23-1469/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
32.5%