CVE-2023-51766

Name
CVE-2023-51766
Description
Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
cve@mitre.org https://bugs.exim.org/show_bug.cgi?id=3063
cve@mitre.org https://exim.org/static/doc/security/CVE-2023-51766.txt
cve@mitre.org https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
cve@mitre.org https://www.openwall.com/lists/oss-security/2023/12/23/2
cve@mitre.org http://www.openwall.com/lists/oss-security/2023/12/24/1
cve@mitre.org http://www.openwall.com/lists/oss-security/2023/12/25/1
cve@mitre.org https://bugzilla.redhat.com/show_bug.cgi?id=2255852
cve@mitre.org https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca
cve@mitre.org https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5
cve@mitre.org https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html
cve@mitre.org http://www.openwall.com/lists/oss-security/2023/12/29/2
cve@mitre.org https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766
cve@mitre.org http://www.openwall.com/lists/oss-security/2024/01/01/1
cve@mitre.org http://www.openwall.com/lists/oss-security/2024/01/01/2
cve@mitre.org http://www.openwall.com/lists/oss-security/2024/01/01/3
cve@mitre.org https://www.youtube.com/watch?v=V8KPV96g1To
cve@mitre.org https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html
cve@mitre.org https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/
cve@mitre.org https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/
cve@mitre.org https://lwn.net/Articles/956533/
af854a3a-2127-422b-91ae-364da2661108 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/
af854a3a-2127-422b-91ae-364da2661108 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* exim >= None < 4.97.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
exim edge-community 4.97.1-r0 Celeste <cielesti@protonmail.com> fixed
exim edge-community 4.97-r0 Celeste <cielesti@protonmail.com> possibly vulnerable
exim edge-community 4.96.2-r0 Jesse Young <jlyo@jlyo.org> possibly vulnerable
exim edge-community 4.96.1-r0 Jesse Young <jlyo@jlyo.org> possibly vulnerable
exim edge-community 4.96-r2 Jesse Young <jlyo@jlyo.org> possibly vulnerable
exim edge-community 4.96-r1 Jesse Young <jlyo@jlyo.org> possibly vulnerable
exim edge-community 4.96-r0 Jesse Young <jlyo@jlyo.org> possibly vulnerable
exim edge-community 4.95-r0 Jesse Young <jlyo@jlyo.org> possibly vulnerable
exim edge-community 4.94.2-r1 Jesse Young <jlyo@jlyo.org> possibly vulnerable
exim edge-community 4.94.2-r0 Jesse Young <jlyo@jlyo.org> possibly vulnerable
exim edge-community 4.93-r1 None possibly vulnerable
exim edge-community 4.92.2-r1 None possibly vulnerable
exim edge-community 4.92.2-r0 None possibly vulnerable
exim edge-community 4.92.1-r0 None possibly vulnerable
exim edge-community 4.92-r0 None possibly vulnerable
exim edge-community 4.90.1-r0 None possibly vulnerable
exim edge-community 4.89.1-r0 None possibly vulnerable
exim edge-community 4.89-r7 None possibly vulnerable
exim edge-community 4.89-r5 None possibly vulnerable
exim 3.22-community 4.97.1-r0 None fixed
exim 3.22-community 4.96.2-r0 None possibly vulnerable
exim 3.22-community 4.96.1-r0 None possibly vulnerable
exim 3.22-community 4.94.2-r0 None possibly vulnerable
exim 3.22-community 4.93-r1 None possibly vulnerable
exim 3.22-community 4.92.2-r1 None possibly vulnerable
exim 3.22-community 4.92.2-r0 None possibly vulnerable
exim 3.22-community 4.92.1-r0 None possibly vulnerable
exim 3.22-community 4.92-r0 None possibly vulnerable
exim 3.22-community 4.90.1-r0 None possibly vulnerable
exim 3.22-community 4.89.1-r0 None possibly vulnerable
exim 3.22-community 4.89-r7 None possibly vulnerable
exim 3.22-community 4.89-r5 None possibly vulnerable
exim 3.21-community 4.97.1-r0 None fixed
exim 3.20-community 4.97.1-r0 Celeste <cielesti@protonmail.com> fixed
exim 3.19-community 4.97.1-r0 Celeste <cielesti@protonmail.com> fixed