CVE-2023-51766

Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
VendorProductVersion
eximexim
𝑥
< 4.97.1
fedoraprojectextra_packages_for_enterprise_linux
7.0
fedoraprojectextra_packages_for_enterprise_linux
8.0
fedoraprojectextra_packages_for_enterprise_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
exim4
bullseye
4.94.2-7+deb11u3
fixed
bullseye (security)
4.94.2-7+deb11u4
fixed
bookworm
4.96-15+deb12u6
fixed
bookworm (security)
4.96-15+deb12u5
fixed
sid
4.98-3
fixed
trixie
4.98-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
exim4
oracular
Fixed 4.97-3
released
noble
Fixed 4.97-3
released
mantic
Fixed 4.96-17ubuntu2.2
released
lunar
ignored
jammy
Fixed 4.95-4ubuntu2.5
released
focal
Fixed 4.93-13ubuntu1.10
released
bionic
Fixed 4.90.1-1ubuntu1.10+esm3
released
xenial
Fixed 4.86.2-2ubuntu2.6+esm6
released
trusty
ignored
References