Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-42118

Опубликовано: 03 мая 2024
Источник: debian
EPSS Низкий

Описание

Exim libspf2 Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Exim libspf2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of SPF macros. When parsing SPF macros, the process does not properly validate user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17578.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libspf2unfixedpackage
libspf2postponedbookwormpackage
libspf2postponedbullseyepackage
libspf2postponedbusterpackage

Примечания

  • https://www.zerodayinitiative.com/advisories/ZDI-23-1472/

  • https://bugs.exim.org/show_bug.cgi?id=3032

  • https://www.openwall.com/lists/oss-security/2023/09/29/5

  • https://www.openwall.com/lists/oss-security/2023/10/01/4

  • https://exim.org/static/doc/security/CVE-2023-zdi.txt

  • https://lists.exim.org/lurker/message/20231004.080103.8c98192c.en.html

  • Potentially same issue as: https://github.com/shevek/libspf2/issues/45

  • https://github.com/shevek/libspf2/pull/44

  • The potentially related (but unknown if exploitable) integer overflow flaw from pull/44

  • is fixed with libspf2/1.2.10-8. There have been 1. no proofs it is exploitable, and the

  • finder clarifies as "ut I haven't been able to get it to do anything after that because

  • another buffer fills up." and 2. that this is the same issue as CVE-2023-42118 .

EPSS

Процентиль: 85%
0.02556
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

Exim libspf2 Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Exim libspf2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of SPF macros. When parsing SPF macros, the process does not properly validate user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-17578.

CVSS3: 7.5
redhat
больше 1 года назад

Exim libspf2 Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Exim libspf2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of SPF macros. When parsing SPF macros, the process does not properly validate user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17578.

CVSS3: 7.5
nvd
около 1 года назад

Exim libspf2 Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Exim libspf2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of SPF macros. When parsing SPF macros, the process does not properly validate user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17578.

CVSS3: 7.5
github
около 1 года назад

Exim libspf2 Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Exim libspf2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of SPF macros. When parsing SPF macros, the process does not properly validate user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-17578.

CVSS3: 7.5
fstec
около 3 лет назад

Уязвимость библиотеки libspf2 почтового сервера Exim, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 85%
0.02556
Низкий