CVE-2023-42116

Publication date 28 September 2023

Last updated 24 July 2024


Ubuntu priority

Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-17515.

Read the notes from the security team

Status

Package Ubuntu Release Status
exim4 23.10 mantic
Fixed 4.96-17ubuntu2
23.04 lunar
Fixed 4.96-14ubuntu1.2
22.04 LTS jammy
Fixed 4.95-4ubuntu2.3
20.04 LTS focal
Fixed 4.93-13ubuntu1.8
18.04 LTS bionic
16.04 LTS xenial
14.04 LTS trusty

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro

Notes


eslerm

no security patches available, see ZDI's timeline


allenpthuang

patches now available, see the thread on Openwall