Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-42115 (GCVE-0-2023-42115)
Vulnerability from cvelistv5
- CWE-787 - Out-of-bounds Write
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "exim", "vendor": "exim", "versions": [ { "lessThan": "4.95", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-42115", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-20T19:32:20.272668Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-20T19:51:52.263Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T19:16:50.537Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1469", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1469/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Exim", "vendor": "Exim", "versions": [ { "status": "affected", "version": "exim 4.95" } ] } ], "dateAssigned": "2023-09-06T16:25:45.458-05:00", "datePublic": "2023-09-27T17:21:04.217-05:00", "descriptions": [ { "lang": "en", "value": "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17434." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T18:30:10.109Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1469", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1469/" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-42115", "datePublished": "2024-05-03T02:13:23.745Z", "dateReserved": "2023-09-06T21:14:24.435Z", "dateUpdated": "2024-09-20T19:51:52.263Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-42115\",\"sourceIdentifier\":\"zdi-disclosures@trendmicro.com\",\"published\":\"2024-05-03T03:15:50.123\",\"lastModified\":\"2025-08-07T18:04:28.990\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \\n\\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\\n. Was ZDI-CAN-17434.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de escritura fuera de los l\u00edmites de Exim AUTH. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Exim. No se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio smtp, que escucha en el puerto TCP 25 de forma predeterminada. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura m\u00e1s all\u00e1 del final de un b\u00fafer. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la cuenta de servicio. Era ZDI-CAN-17434.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.96.1\",\"matchCriteriaId\":\"BC8D7E21-6CC1-45EE-A100-AC7B6E0D9FC8\"}]}]}],\"references\":[{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-23-1469/\",\"source\":\"zdi-disclosures@trendmicro.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-23-1469/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-23-1469/\", \"name\": \"ZDI-23-1469\", \"tags\": [\"x_research-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T19:16:50.537Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-42115\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-20T19:32:20.272668Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*\"], \"vendor\": \"exim\", \"product\": \"exim\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"4.95\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-06T18:08:50.835Z\"}}], \"cna\": {\"title\": \"Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability\", \"source\": {\"lang\": \"en\", \"value\": \"Anonymous\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}}], \"affected\": [{\"vendor\": \"Exim\", \"product\": \"Exim\", \"versions\": [{\"status\": \"affected\", \"version\": \"exim 4.95\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2023-09-27T17:21:04.217-05:00\", \"references\": [{\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-23-1469/\", \"name\": \"ZDI-23-1469\", \"tags\": [\"x_research-advisory\"]}], \"dateAssigned\": \"2023-09-06T16:25:45.458-05:00\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \\n\\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\\n. Was ZDI-CAN-17434.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787: Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"99f1926a-a320-47d8-bbb5-42feb611262e\", \"shortName\": \"zdi\", \"dateUpdated\": \"2024-09-18T18:30:10.109Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-42115\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-20T19:51:52.263Z\", \"dateReserved\": \"2023-09-06T21:14:24.435Z\", \"assignerOrgId\": \"99f1926a-a320-47d8-bbb5-42feb611262e\", \"datePublished\": \"2024-05-03T02:13:23.745Z\", \"assignerShortName\": \"zdi\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ghsa-67rj-8f2h-26fc
Vulnerability from github
Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-17434.
{ "affected": [], "aliases": [ "CVE-2023-42115" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-05-03T03:15:50Z", "severity": "CRITICAL" }, "details": "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-17434.", "id": "GHSA-67rj-8f2h-26fc", "modified": "2024-05-03T03:31:02Z", "published": "2024-05-03T03:31:02Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42115" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1469" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
wid-sec-w-2023-2505
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Exim (EXperimental Internet Mailer) ist ein Mailserver und Mail Transfer Agent.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Exim ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2505 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2505.json" }, { "category": "self", "summary": "WID-SEC-2023-2505 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2505" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202402-18 vom 2024-02-18", "url": "https://security.gentoo.org/glsa/202402-18" }, { "category": "external", "summary": "IBM X-Force Exchange Advisory vom 2023-09-27", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267177" }, { "category": "external", "summary": "IBM X-Force Exchange Advisory vom 2023-09-27", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267176" }, { "category": "external", "summary": "IBM X-Force Exchange Advisory vom 2023-09-27", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267175" }, { "category": "external", "summary": "IBM X-Force Exchange Advisory vom 2023-09-27", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267173" }, { "category": "external", "summary": "IBM X-Force Exchange Advisory vom 2023-09-27", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267172" }, { "category": "external", "summary": "IBM X-Force Exchange Advisory vom 2023-09-27", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267168" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-B317DD9220 vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-b317dd9220" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-EPEL-2023-2EDA308E31 vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-2eda308e31" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-0A7690525F vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-0a7690525f" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-0ABCFEBECD vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-0abcfebecd" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-C737BEF4E1 vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-c737bef4e1" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-AE340C92EA vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-ae340c92ea" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-42313AF0DE vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-42313af0de" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-7F01E967AD vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-7f01e967ad" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-EPEL-2023-BFDE2B0C7C vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-bfde2b0c7c" }, { "category": "external", "summary": "Debian Security Advisory DLA-3599 vom 2023-10-02", "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00002.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-EPEL-2023-2661620873 vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-2661620873" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-EPEL-2023-BB93ECB59D vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-bb93ecb59d" }, { "category": "external", "summary": "Debian Security Advisory DSA-5512 vom 2023-10-02", "url": "https://lists.debian.org/debian-security-announce/2023/msg00205.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-EPEL-2023-458A169F82 vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-458a169f82" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-EPEL-2023-35A1E9B1B2 vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-35a1e9b1b2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6411-1 vom 2023-10-04", "url": "https://ubuntu.com/security/notices/USN-6411-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1860 vom 2023-10-25", "url": "https://alas.aws.amazon.com/ALAS-2023-1860.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6455-1 vom 2023-10-30", "url": "https://ubuntu.com/security/notices/USN-6455-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-3938 vom 2024-10-29", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00029.html" } ], "source_lang": "en-US", "title": "Exim: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-10-28T23:00:00.000+00:00", "generator": { "date": "2024-10-29T09:07:25.637+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2023-2505", "initial_release_date": "2023-09-27T22:00:00.000+00:00", "revision_history": [ { "date": "2023-09-27T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Fedora und Debian aufgenommen" }, { "date": "2023-10-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-10-24T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-10-29T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-02-18T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-10-28T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Open Source Exim", "product": { "name": "Open Source Exim", "product_id": "T007959", "product_identification_helper": { "cpe": "cpe:/a:exim:exim:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-42115", "notes": [ { "category": "description", "text": "In Exim existieren mehrere Schwachstellen. Diese bestehen aufgrund von Problemen im smtp Service und aufgrund eines Stack-basierter Puffer\u00fcberlaufs, verursacht durch unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung der Grenzen bei der Verarbeitung von NTLM-Challenge-Anfragen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T000126", "T007959", "398363", "T012167", "74185" ] }, "release_date": "2023-09-27T22:00:00.000+00:00", "title": "CVE-2023-42115" }, { "cve": "CVE-2023-42116", "notes": [ { "category": "description", "text": "In Exim existieren mehrere Schwachstellen. Diese bestehen aufgrund von Problemen im smtp Service und aufgrund eines Stack-basierter Puffer\u00fcberlaufs, verursacht durch unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung der Grenzen bei der Verarbeitung von NTLM-Challenge-Anfragen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T000126", "T007959", "398363", "T012167", "74185" ] }, "release_date": "2023-09-27T22:00:00.000+00:00", "title": "CVE-2023-42116" }, { "cve": "CVE-2023-42117", "notes": [ { "category": "description", "text": "In Exim existieren mehrere Schwachstellen. Diese bestehen aufgrund von Problemen im smtp Service und aufgrund eines Stack-basierter Puffer\u00fcberlaufs, verursacht durch unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung der Grenzen bei der Verarbeitung von NTLM-Challenge-Anfragen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T000126", "T007959", "398363", "T012167", "74185" ] }, "release_date": "2023-09-27T22:00:00.000+00:00", "title": "CVE-2023-42117" }, { "cve": "CVE-2023-42114", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Exim. Diese wird durch einen Fehler in der Behandlung von NTLM-Challenge-Anfragen verursacht. Ein entfernter, anonymer Angreifer kann das ausnutzen, um Informationen offenzulegen." } ], "product_status": { "known_affected": [ "2951", "T000126", "T007959", "398363", "T012167", "74185" ] }, "release_date": "2023-09-27T22:00:00.000+00:00", "title": "CVE-2023-42114" }, { "cve": "CVE-2023-42118", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Exim. Die Ursache ist ein Fehler im Parsen von SPF-Makros. Ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T000126", "T007959", "398363", "T012167", "74185" ] }, "release_date": "2023-09-27T22:00:00.000+00:00", "title": "CVE-2023-42118" }, { "cve": "CVE-2023-42119", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Exim. Diese besteht aufgrund eines Fehlers im smtp-Dienst. Ein Angreifer aus dem angrenzenden Netzwerk kann das ausnutzen, um Informationen offenzulegen." } ], "product_status": { "known_affected": [ "2951", "T000126", "T007959", "398363", "T012167", "74185" ] }, "release_date": "2023-09-27T22:00:00.000+00:00", "title": "CVE-2023-42119" } ] }
WID-SEC-W-2023-2505
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Exim (EXperimental Internet Mailer) ist ein Mailserver und Mail Transfer Agent.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Exim ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2505 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2505.json" }, { "category": "self", "summary": "WID-SEC-2023-2505 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2505" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202402-18 vom 2024-02-18", "url": "https://security.gentoo.org/glsa/202402-18" }, { "category": "external", "summary": "IBM X-Force Exchange Advisory vom 2023-09-27", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267177" }, { "category": "external", "summary": "IBM X-Force Exchange Advisory vom 2023-09-27", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267176" }, { "category": "external", "summary": "IBM X-Force Exchange Advisory vom 2023-09-27", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267175" }, { "category": "external", "summary": "IBM X-Force Exchange Advisory vom 2023-09-27", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267173" }, { "category": "external", "summary": "IBM X-Force Exchange Advisory vom 2023-09-27", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267172" }, { "category": "external", "summary": "IBM X-Force Exchange Advisory vom 2023-09-27", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267168" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-B317DD9220 vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-b317dd9220" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-EPEL-2023-2EDA308E31 vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-2eda308e31" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-0A7690525F vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-0a7690525f" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-0ABCFEBECD vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-0abcfebecd" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-C737BEF4E1 vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-c737bef4e1" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-AE340C92EA vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-ae340c92ea" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-42313AF0DE vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-42313af0de" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-7F01E967AD vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-7f01e967ad" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-EPEL-2023-BFDE2B0C7C vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-bfde2b0c7c" }, { "category": "external", "summary": "Debian Security Advisory DLA-3599 vom 2023-10-02", "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00002.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-EPEL-2023-2661620873 vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-2661620873" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-EPEL-2023-BB93ECB59D vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-bb93ecb59d" }, { "category": "external", "summary": "Debian Security Advisory DSA-5512 vom 2023-10-02", "url": "https://lists.debian.org/debian-security-announce/2023/msg00205.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-EPEL-2023-458A169F82 vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-458a169f82" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-EPEL-2023-35A1E9B1B2 vom 2023-10-02", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-35a1e9b1b2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6411-1 vom 2023-10-04", "url": "https://ubuntu.com/security/notices/USN-6411-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1860 vom 2023-10-25", "url": "https://alas.aws.amazon.com/ALAS-2023-1860.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6455-1 vom 2023-10-30", "url": "https://ubuntu.com/security/notices/USN-6455-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-3938 vom 2024-10-29", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00029.html" } ], "source_lang": "en-US", "title": "Exim: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-10-28T23:00:00.000+00:00", "generator": { "date": "2024-10-29T09:07:25.637+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2023-2505", "initial_release_date": "2023-09-27T22:00:00.000+00:00", "revision_history": [ { "date": "2023-09-27T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Fedora und Debian aufgenommen" }, { "date": "2023-10-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-10-24T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-10-29T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-02-18T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-10-28T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Open Source Exim", "product": { "name": "Open Source Exim", "product_id": "T007959", "product_identification_helper": { "cpe": "cpe:/a:exim:exim:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-42115", "notes": [ { "category": "description", "text": "In Exim existieren mehrere Schwachstellen. Diese bestehen aufgrund von Problemen im smtp Service und aufgrund eines Stack-basierter Puffer\u00fcberlaufs, verursacht durch unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung der Grenzen bei der Verarbeitung von NTLM-Challenge-Anfragen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T000126", "T007959", "398363", "T012167", "74185" ] }, "release_date": "2023-09-27T22:00:00.000+00:00", "title": "CVE-2023-42115" }, { "cve": "CVE-2023-42116", "notes": [ { "category": "description", "text": "In Exim existieren mehrere Schwachstellen. Diese bestehen aufgrund von Problemen im smtp Service und aufgrund eines Stack-basierter Puffer\u00fcberlaufs, verursacht durch unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung der Grenzen bei der Verarbeitung von NTLM-Challenge-Anfragen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T000126", "T007959", "398363", "T012167", "74185" ] }, "release_date": "2023-09-27T22:00:00.000+00:00", "title": "CVE-2023-42116" }, { "cve": "CVE-2023-42117", "notes": [ { "category": "description", "text": "In Exim existieren mehrere Schwachstellen. Diese bestehen aufgrund von Problemen im smtp Service und aufgrund eines Stack-basierter Puffer\u00fcberlaufs, verursacht durch unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung der Grenzen bei der Verarbeitung von NTLM-Challenge-Anfragen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T000126", "T007959", "398363", "T012167", "74185" ] }, "release_date": "2023-09-27T22:00:00.000+00:00", "title": "CVE-2023-42117" }, { "cve": "CVE-2023-42114", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Exim. Diese wird durch einen Fehler in der Behandlung von NTLM-Challenge-Anfragen verursacht. Ein entfernter, anonymer Angreifer kann das ausnutzen, um Informationen offenzulegen." } ], "product_status": { "known_affected": [ "2951", "T000126", "T007959", "398363", "T012167", "74185" ] }, "release_date": "2023-09-27T22:00:00.000+00:00", "title": "CVE-2023-42114" }, { "cve": "CVE-2023-42118", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Exim. Die Ursache ist ein Fehler im Parsen von SPF-Makros. Ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T000126", "T007959", "398363", "T012167", "74185" ] }, "release_date": "2023-09-27T22:00:00.000+00:00", "title": "CVE-2023-42118" }, { "cve": "CVE-2023-42119", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Exim. Diese besteht aufgrund eines Fehlers im smtp-Dienst. Ein Angreifer aus dem angrenzenden Netzwerk kann das ausnutzen, um Informationen offenzulegen." } ], "product_status": { "known_affected": [ "2951", "T000126", "T007959", "398363", "T012167", "74185" ] }, "release_date": "2023-09-27T22:00:00.000+00:00", "title": "CVE-2023-42119" } ] }
opensuse-su-2024:0007-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for exim", "title": "Title of the patch" }, { "category": "description", "text": "This update for exim fixes the following issues:\n\nexim was updated to 4.97.1 (boo#1218387, CVE-2023-51766):\n\n * Fixes for the smtp protocol smuggling (CVE-2023-51766)\n\nexim was updated to exim 4.96:\n\n * Move from using the pcre library to pcre2.\n * Constification work in the filters module required a major version\n bump for the local-scan API. Specifically, the \u0027headers_charset\u0027\n global which is visible via the API is now const and may therefore\n not be modified by local-scan code.\n * Bug 2819: speed up command-line messages being read in. Previously a\n time check was being done for every character; replace that with one\n per buffer.\n * Bug 2815: Fix ALPN sent by server under OpenSSL. Previously the string\n sent was prefixed with a length byte.\n * Change the SMTP feature name for pipelining connect to be compliant with\n RFC 5321. Previously Dovecot (at least) would log errors during\n submission.\n * Fix macro-definition during \u0027-be\u0027 expansion testing. The move to\n write-protected store for macros had not accounted for these runtime\n additions; fix by removing this protection for \u0027-be\u0027 mode.\n * Convert all uses of select() to poll().\n * Fix use of $sender_host_name in daemon process. When used in certain\n main-section options or in a connect ACL, the value from the first ever\n connection was never replaced for subsequent connections.\n * Bug 2838: Fix for i32lp64 hard-align platforms\n * Bug 2845: Fix handling of tls_require_ciphers for OpenSSL when a value\n with underbars is given.\n * Bug 1895: TLS: Deprecate RFC 5114 Diffie-Hellman parameters.\n * Debugging initiated by an ACL control now continues through into routing\n and transport processes.\n * The \u0027expand\u0027 debug selector now gives more detail, specifically on the\n result of expansion operators and items.\n * Bug 2751: Fix include_directory in redirect routers. Previously a\n bad comparison between the option value and the name of the file to\n be included was done, and a mismatch was wrongly identified.\n * Support for Berkeley DB versions 1 and 2 is withdrawn.\n * When built with NDBM for hints DB\u0027s check for nonexistence of a name\n supplied as the db file-pair basename.\n * Remove the \u0027allow_insecure_tainted_data\u0027 main config option and the\n \u0027taint\u0027 log_selector.\n * Fix static address-list lookups to properly return the matched item.\n Previously only the domain part was returned.\n * The ${run} expansion item now expands its command string elements after\n splitting. Previously it was before; the new ordering makes handling\n zero-length arguments simpler.\n * Taint-check exec arguments for transport-initiated external processes.\n Previously, tainted values could be used. This affects \u0027pipe\u0027, \u0027lmtp\u0027 and\n \u0027queryprogram\u0027 transport, transport-filter, and ETRN commands.\n The ${run} expansion is also affected: in \u0027preexpand\u0027 mode no part of\n the command line may be tainted, in default mode the executable name\n may not be tainted.\n * Fix CHUNKING on a continued-transport. Previously the usabilility of\n the facility was not passed across execs, and only the first message\n passed over a connection could use BDAT; any further ones using DATA.\n * Support the PIPECONNECT facility in the smtp transport when the helo_data\n uses $sending_ip_address and an interface is specified.\n * OpenSSL: fix transport-required OCSP stapling verification under session\n resumption.\n * TLS resumption: the key for session lookup in the client now includes\n more info that a server could potentially use in configuring a TLS\n session, avoiding oferring mismatching sessions to such a server.\n * Fix string_copyn() for limit greater than actual string length.\n * Bug 2886: GnuTLS: Do not free the cached creds on transport connection\n close; it may be needed for a subsequent connection.\n * Fix CHUNKING for a second message on a connection when the first was\n rejected.\n * Fix ${srs_encode ...} to handle an empty sender address, now returning\n an empty address.\n * Bug 2855: Handle a v4mapped sender address given us by a frontending\n proxy.\n\nupdate to exim 4.95\n\n * includes taintwarn (taintwarn.patch)\n * fast-ramp queue run\n * native SRS\n * TLS resumption\n * LMDB lookups with single key\n * smtp transport option \u0027message_linelength_limit\u0027\n * optionally ignore lookup caches\n * quota checking for appendfile transport during message reception\n * sqlite lookups allow a \u0027file=\u003cpath\u003e\u0027 option\n * lsearch lookups allow a \u0027ret=full\u0027 option\n * command line option for the notifier socket\n * faster TLS startup\n * new main config option \u0027proxy_protocol_timeout\u0027\n * expand \u0027smtp_accept_max_per_connection\u0027\n * log selector \u0027queue_size_exclusive\u0027\n * main config option \u0027smtp_backlog_monitor\u0027\n * main config option \u0027hosts_require_helo\u0027\n * main config option \u0027allow_insecure_tainted_data\u0027", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2024-7", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0007-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2024:0007-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHLYW3QLWRHGQXVXSQUL2DBTCFFCJGNB/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2024:0007-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHLYW3QLWRHGQXVXSQUL2DBTCFFCJGNB/" }, { "category": "self", "summary": "SUSE Bug 1218387", "url": "https://bugzilla.suse.com/1218387" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3559 page", "url": "https://www.suse.com/security/cve/CVE-2022-3559/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42114 page", "url": "https://www.suse.com/security/cve/CVE-2023-42114/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42115 page", "url": "https://www.suse.com/security/cve/CVE-2023-42115/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42116 page", "url": "https://www.suse.com/security/cve/CVE-2023-42116/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42117 page", "url": "https://www.suse.com/security/cve/CVE-2023-42117/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42119 page", "url": "https://www.suse.com/security/cve/CVE-2023-42119/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51766 page", "url": "https://www.suse.com/security/cve/CVE-2023-51766/" } ], "title": "Security update for exim", "tracking": { "current_release_date": "2024-01-03T20:12:49Z", "generator": { "date": "2024-01-03T20:12:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:0007-1", "initial_release_date": "2024-01-03T20:12:49Z", "revision_history": [ { "date": "2024-01-03T20:12:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "exim-4.97.1-bp155.5.9.1.aarch64", "product": { "name": "exim-4.97.1-bp155.5.9.1.aarch64", "product_id": "exim-4.97.1-bp155.5.9.1.aarch64" } }, { "category": "product_version", "name": "eximon-4.97.1-bp155.5.9.1.aarch64", "product": { "name": "eximon-4.97.1-bp155.5.9.1.aarch64", "product_id": "eximon-4.97.1-bp155.5.9.1.aarch64" } }, { "category": "product_version", "name": "eximstats-html-4.97.1-bp155.5.9.1.aarch64", "product": { "name": "eximstats-html-4.97.1-bp155.5.9.1.aarch64", "product_id": "eximstats-html-4.97.1-bp155.5.9.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "exim-4.97.1-bp155.5.9.1.ppc64le", "product": { "name": "exim-4.97.1-bp155.5.9.1.ppc64le", "product_id": "exim-4.97.1-bp155.5.9.1.ppc64le" } }, { "category": "product_version", "name": "eximon-4.97.1-bp155.5.9.1.ppc64le", "product": { "name": "eximon-4.97.1-bp155.5.9.1.ppc64le", "product_id": "eximon-4.97.1-bp155.5.9.1.ppc64le" } }, { "category": "product_version", "name": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "product": { "name": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "product_id": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "exim-4.97.1-bp155.5.9.1.s390x", "product": { "name": "exim-4.97.1-bp155.5.9.1.s390x", "product_id": "exim-4.97.1-bp155.5.9.1.s390x" } }, { "category": "product_version", "name": "eximon-4.97.1-bp155.5.9.1.s390x", "product": { "name": "eximon-4.97.1-bp155.5.9.1.s390x", "product_id": "eximon-4.97.1-bp155.5.9.1.s390x" } }, { "category": "product_version", "name": "eximstats-html-4.97.1-bp155.5.9.1.s390x", "product": { "name": "eximstats-html-4.97.1-bp155.5.9.1.s390x", "product_id": "eximstats-html-4.97.1-bp155.5.9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "exim-4.97.1-bp155.5.9.1.x86_64", "product": { "name": "exim-4.97.1-bp155.5.9.1.x86_64", "product_id": "exim-4.97.1-bp155.5.9.1.x86_64" } }, { "category": "product_version", "name": "eximon-4.97.1-bp155.5.9.1.x86_64", "product": { "name": "eximon-4.97.1-bp155.5.9.1.x86_64", "product_id": "eximon-4.97.1-bp155.5.9.1.x86_64" } }, { "category": "product_version", "name": "eximstats-html-4.97.1-bp155.5.9.1.x86_64", "product": { "name": "eximstats-html-4.97.1-bp155.5.9.1.x86_64", "product_id": "eximstats-html-4.97.1-bp155.5.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP5", "product": { "name": "SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5" } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.aarch64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64" }, "product_reference": "exim-4.97.1-bp155.5.9.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.ppc64le as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le" }, "product_reference": "exim-4.97.1-bp155.5.9.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.s390x as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x" }, "product_reference": "exim-4.97.1-bp155.5.9.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.x86_64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64" }, "product_reference": "exim-4.97.1-bp155.5.9.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.aarch64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.ppc64le as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.s390x as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.x86_64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.aarch64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.s390x as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.x86_64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64" }, "product_reference": "exim-4.97.1-bp155.5.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le" }, "product_reference": "exim-4.97.1-bp155.5.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x" }, "product_reference": "exim-4.97.1-bp155.5.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.97.1-bp155.5.9.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64" }, "product_reference": "exim-4.97.1-bp155.5.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.97.1-bp155.5.9.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64" }, "product_reference": "eximon-4.97.1-bp155.5.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.97.1-bp155.5.9.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" }, "product_reference": "eximstats-html-4.97.1-bp155.5.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3559" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3559", "url": "https://www.suse.com/security/cve/CVE-2022-3559" }, { "category": "external", "summary": "SUSE Bug 1204427 for CVE-2022-3559", "url": "https://bugzilla.suse.com/1204427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "important" } ], "title": "CVE-2022-3559" }, { "cve": "CVE-2023-42114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42114" } ], "notes": [ { "category": "general", "text": "Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to disclose information in the context of the service account.\n. Was ZDI-CAN-17433.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42114", "url": "https://www.suse.com/security/cve/CVE-2023-42114" }, { "category": "external", "summary": "SUSE Bug 1215784 for CVE-2023-42114", "url": "https://bugzilla.suse.com/1215784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "moderate" } ], "title": "CVE-2023-42114" }, { "cve": "CVE-2023-42115", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42115" } ], "notes": [ { "category": "general", "text": "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17434.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42115", "url": "https://www.suse.com/security/cve/CVE-2023-42115" }, { "category": "external", "summary": "SUSE Bug 1215785 for CVE-2023-42115", "url": "https://bugzilla.suse.com/1215785" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "important" } ], "title": "CVE-2023-42115" }, { "cve": "CVE-2023-42116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42116" } ], "notes": [ { "category": "general", "text": "Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17515.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42116", "url": "https://www.suse.com/security/cve/CVE-2023-42116" }, { "category": "external", "summary": "SUSE Bug 1215786 for CVE-2023-42116", "url": "https://bugzilla.suse.com/1215786" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "critical" } ], "title": "CVE-2023-42116" }, { "cve": "CVE-2023-42117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42117" } ], "notes": [ { "category": "general", "text": "Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17554.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42117", "url": "https://www.suse.com/security/cve/CVE-2023-42117" }, { "category": "external", "summary": "SUSE Bug 1215787 for CVE-2023-42117", "url": "https://bugzilla.suse.com/1215787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "critical" } ], "title": "CVE-2023-42117" }, { "cve": "CVE-2023-42119", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42119" } ], "notes": [ { "category": "general", "text": "Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the service account.\n. Was ZDI-CAN-17643.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42119", "url": "https://www.suse.com/security/cve/CVE-2023-42119" }, { "category": "external", "summary": "SUSE Bug 1215789 for CVE-2023-42119", "url": "https://bugzilla.suse.com/1215789" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "low" } ], "title": "CVE-2023-42119" }, { "cve": "CVE-2023-51766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51766" } ], "notes": [ { "category": "general", "text": "Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports \u003cLF\u003e.\u003cCR\u003e\u003cLF\u003e but some other popular e-mail servers do not.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51766", "url": "https://www.suse.com/security/cve/CVE-2023-51766" }, { "category": "external", "summary": "SUSE Bug 1218387 for CVE-2023-51766", "url": "https://bugzilla.suse.com/1218387" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-01-03T20:12:49Z", "details": "moderate" } ], "title": "CVE-2023-51766" } ] }
opensuse-su-2024:13282-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "exim-4.96.1-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the exim-4.96.1-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13282", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13282-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42114 page", "url": "https://www.suse.com/security/cve/CVE-2023-42114/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42115 page", "url": "https://www.suse.com/security/cve/CVE-2023-42115/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42116 page", "url": "https://www.suse.com/security/cve/CVE-2023-42116/" } ], "title": "exim-4.96.1-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13282-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "exim-4.96.1-1.1.aarch64", "product": { "name": "exim-4.96.1-1.1.aarch64", "product_id": "exim-4.96.1-1.1.aarch64" } }, { "category": "product_version", "name": "eximon-4.96.1-1.1.aarch64", "product": { "name": "eximon-4.96.1-1.1.aarch64", "product_id": "eximon-4.96.1-1.1.aarch64" } }, { "category": "product_version", "name": "eximstats-html-4.96.1-1.1.aarch64", "product": { "name": "eximstats-html-4.96.1-1.1.aarch64", "product_id": "eximstats-html-4.96.1-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "exim-4.96.1-1.1.ppc64le", "product": { "name": "exim-4.96.1-1.1.ppc64le", "product_id": "exim-4.96.1-1.1.ppc64le" } }, { "category": "product_version", "name": "eximon-4.96.1-1.1.ppc64le", "product": { "name": "eximon-4.96.1-1.1.ppc64le", "product_id": "eximon-4.96.1-1.1.ppc64le" } }, { "category": "product_version", "name": "eximstats-html-4.96.1-1.1.ppc64le", "product": { "name": "eximstats-html-4.96.1-1.1.ppc64le", "product_id": "eximstats-html-4.96.1-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "exim-4.96.1-1.1.s390x", "product": { "name": "exim-4.96.1-1.1.s390x", "product_id": "exim-4.96.1-1.1.s390x" } }, { "category": "product_version", "name": "eximon-4.96.1-1.1.s390x", "product": { "name": "eximon-4.96.1-1.1.s390x", "product_id": "eximon-4.96.1-1.1.s390x" } }, { "category": "product_version", "name": "eximstats-html-4.96.1-1.1.s390x", "product": { "name": "eximstats-html-4.96.1-1.1.s390x", "product_id": "eximstats-html-4.96.1-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "exim-4.96.1-1.1.x86_64", "product": { "name": "exim-4.96.1-1.1.x86_64", "product_id": "exim-4.96.1-1.1.x86_64" } }, { "category": "product_version", "name": "eximon-4.96.1-1.1.x86_64", "product": { "name": "eximon-4.96.1-1.1.x86_64", "product_id": "eximon-4.96.1-1.1.x86_64" } }, { "category": "product_version", "name": "eximstats-html-4.96.1-1.1.x86_64", "product": { "name": "eximstats-html-4.96.1-1.1.x86_64", "product_id": "eximstats-html-4.96.1-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "exim-4.96.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64" }, "product_reference": "exim-4.96.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.96.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le" }, "product_reference": "exim-4.96.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.96.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x" }, "product_reference": "exim-4.96.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.96.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64" }, "product_reference": "exim-4.96.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.96.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64" }, "product_reference": "eximon-4.96.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.96.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le" }, "product_reference": "eximon-4.96.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.96.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x" }, "product_reference": "eximon-4.96.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.96.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64" }, "product_reference": "eximon-4.96.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.96.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64" }, "product_reference": "eximstats-html-4.96.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.96.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le" }, "product_reference": "eximstats-html-4.96.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.96.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x" }, "product_reference": "eximstats-html-4.96.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.96.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64" }, "product_reference": "eximstats-html-4.96.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-42114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42114" } ], "notes": [ { "category": "general", "text": "Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to disclose information in the context of the service account.\n. Was ZDI-CAN-17433.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42114", "url": "https://www.suse.com/security/cve/CVE-2023-42114" }, { "category": "external", "summary": "SUSE Bug 1215784 for CVE-2023-42114", "url": "https://bugzilla.suse.com/1215784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42114" }, { "cve": "CVE-2023-42115", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42115" } ], "notes": [ { "category": "general", "text": "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17434.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42115", "url": "https://www.suse.com/security/cve/CVE-2023-42115" }, { "category": "external", "summary": "SUSE Bug 1215785 for CVE-2023-42115", "url": "https://bugzilla.suse.com/1215785" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-42115" }, { "cve": "CVE-2023-42116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42116" } ], "notes": [ { "category": "general", "text": "Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17515.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42116", "url": "https://www.suse.com/security/cve/CVE-2023-42116" }, { "category": "external", "summary": "SUSE Bug 1215786 for CVE-2023-42116", "url": "https://bugzilla.suse.com/1215786" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2023-42116" } ] }
opensuse-su-2023:0293-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for exim", "title": "Title of the patch" }, { "category": "description", "text": "This update for exim fixes the following issues:\n\n\n* CVE-2023-42114: NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability (boo#1215784)\n* CVE-2023-42115: AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability (boo#1215785)\n* CVE-2023-42116: SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability (boo#1215786)\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2023-293", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2023_0293-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2023:0293-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ULUNDOS6XEEFBG43DSBNULVEPHZ4YYJ/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2023:0293-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ULUNDOS6XEEFBG43DSBNULVEPHZ4YYJ/" }, { "category": "self", "summary": "SUSE Bug 1215784", "url": "https://bugzilla.suse.com/1215784" }, { "category": "self", "summary": "SUSE Bug 1215785", "url": "https://bugzilla.suse.com/1215785" }, { "category": "self", "summary": "SUSE Bug 1215786", "url": "https://bugzilla.suse.com/1215786" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42114 page", "url": "https://www.suse.com/security/cve/CVE-2023-42114/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42115 page", "url": "https://www.suse.com/security/cve/CVE-2023-42115/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42116 page", "url": "https://www.suse.com/security/cve/CVE-2023-42116/" } ], "title": "Security update for exim", "tracking": { "current_release_date": "2023-10-05T09:26:19Z", "generator": { "date": "2023-10-05T09:26:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2023:0293-1", "initial_release_date": "2023-10-05T09:26:19Z", "revision_history": [ { "date": "2023-10-05T09:26:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "exim-4.94.2-bp155.5.3.1.aarch64", "product": { "name": "exim-4.94.2-bp155.5.3.1.aarch64", "product_id": "exim-4.94.2-bp155.5.3.1.aarch64" } }, { "category": "product_version", "name": "eximon-4.94.2-bp155.5.3.1.aarch64", "product": { "name": "eximon-4.94.2-bp155.5.3.1.aarch64", "product_id": "eximon-4.94.2-bp155.5.3.1.aarch64" } }, { "category": "product_version", "name": "eximstats-html-4.94.2-bp155.5.3.1.aarch64", "product": { "name": "eximstats-html-4.94.2-bp155.5.3.1.aarch64", "product_id": "eximstats-html-4.94.2-bp155.5.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "exim-4.94.2-bp155.5.3.1.ppc64le", "product": { "name": "exim-4.94.2-bp155.5.3.1.ppc64le", "product_id": "exim-4.94.2-bp155.5.3.1.ppc64le" } }, { "category": "product_version", "name": "eximon-4.94.2-bp155.5.3.1.ppc64le", "product": { "name": "eximon-4.94.2-bp155.5.3.1.ppc64le", "product_id": "eximon-4.94.2-bp155.5.3.1.ppc64le" } }, { "category": "product_version", "name": "eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "product": { "name": "eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "product_id": "eximstats-html-4.94.2-bp155.5.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "exim-4.94.2-bp155.5.3.1.s390x", "product": { "name": "exim-4.94.2-bp155.5.3.1.s390x", "product_id": "exim-4.94.2-bp155.5.3.1.s390x" } }, { "category": "product_version", "name": "eximon-4.94.2-bp155.5.3.1.s390x", "product": { "name": "eximon-4.94.2-bp155.5.3.1.s390x", "product_id": "eximon-4.94.2-bp155.5.3.1.s390x" } }, { "category": "product_version", "name": "eximstats-html-4.94.2-bp155.5.3.1.s390x", "product": { "name": "eximstats-html-4.94.2-bp155.5.3.1.s390x", "product_id": "eximstats-html-4.94.2-bp155.5.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "exim-4.94.2-bp155.5.3.1.x86_64", "product": { "name": "exim-4.94.2-bp155.5.3.1.x86_64", "product_id": "exim-4.94.2-bp155.5.3.1.x86_64" } }, { "category": "product_version", "name": "eximon-4.94.2-bp155.5.3.1.x86_64", "product": { "name": "eximon-4.94.2-bp155.5.3.1.x86_64", "product_id": "eximon-4.94.2-bp155.5.3.1.x86_64" } }, { "category": "product_version", "name": "eximstats-html-4.94.2-bp155.5.3.1.x86_64", "product": { "name": "eximstats-html-4.94.2-bp155.5.3.1.x86_64", "product_id": "eximstats-html-4.94.2-bp155.5.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP4", "product": { "name": "SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4" } }, { "category": "product_name", "name": "SUSE Package Hub 15 SP5", "product": { "name": "SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5" } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.aarch64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64" }, "product_reference": "exim-4.94.2-bp155.5.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.ppc64le as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le" }, "product_reference": "exim-4.94.2-bp155.5.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.s390x as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x" }, "product_reference": "exim-4.94.2-bp155.5.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.x86_64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64" }, "product_reference": "exim-4.94.2-bp155.5.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.aarch64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.ppc64le as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.s390x as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.x86_64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.aarch64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.ppc64le as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.s390x as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.x86_64 as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.aarch64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64" }, "product_reference": "exim-4.94.2-bp155.5.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.ppc64le as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le" }, "product_reference": "exim-4.94.2-bp155.5.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.s390x as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x" }, "product_reference": "exim-4.94.2-bp155.5.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.x86_64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64" }, "product_reference": "exim-4.94.2-bp155.5.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.aarch64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.ppc64le as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.s390x as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.x86_64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.aarch64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.ppc64le as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.s390x as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.x86_64 as component of SUSE Package Hub 15 SP5", "product_id": "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64" }, "product_reference": "exim-4.94.2-bp155.5.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le" }, "product_reference": "exim-4.94.2-bp155.5.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x" }, "product_reference": "exim-4.94.2-bp155.5.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64" }, "product_reference": "exim-4.94.2-bp155.5.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64" }, "product_reference": "exim-4.94.2-bp155.5.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le" }, "product_reference": "exim-4.94.2-bp155.5.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x" }, "product_reference": "exim-4.94.2-bp155.5.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "exim-4.94.2-bp155.5.3.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64" }, "product_reference": "exim-4.94.2-bp155.5.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximon-4.94.2-bp155.5.3.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64" }, "product_reference": "eximon-4.94.2-bp155.5.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "eximstats-html-4.94.2-bp155.5.3.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64" }, "product_reference": "eximstats-html-4.94.2-bp155.5.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-42114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42114" } ], "notes": [ { "category": "general", "text": "Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to disclose information in the context of the service account.\n. Was ZDI-CAN-17433.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42114", "url": "https://www.suse.com/security/cve/CVE-2023-42114" }, { "category": "external", "summary": "SUSE Bug 1215784 for CVE-2023-42114", "url": "https://bugzilla.suse.com/1215784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-10-05T09:26:19Z", "details": "moderate" } ], "title": "CVE-2023-42114" }, { "cve": "CVE-2023-42115", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42115" } ], "notes": [ { "category": "general", "text": "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17434.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42115", "url": "https://www.suse.com/security/cve/CVE-2023-42115" }, { "category": "external", "summary": "SUSE Bug 1215785 for CVE-2023-42115", "url": "https://bugzilla.suse.com/1215785" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-10-05T09:26:19Z", "details": "important" } ], "title": "CVE-2023-42115" }, { "cve": "CVE-2023-42116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42116" } ], "notes": [ { "category": "general", "text": "Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17515.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42116", "url": "https://www.suse.com/security/cve/CVE-2023-42116" }, { "category": "external", "summary": "SUSE Bug 1215786 for CVE-2023-42116", "url": "https://bugzilla.suse.com/1215786" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-10-05T09:26:19Z", "details": "critical" } ], "title": "CVE-2023-42116" } ] }
gsd-2023-42115
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2023-42115", "id": "GSD-2023-42115" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-42115" ], "id": "GSD-2023-42115", "modified": "2023-12-13T01:20:21.715407Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2023-42115", "STATE": "RESERVED" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." } ] } } } }
CERTFR-2023-ALE-010
Vulnerability from certfr_alerte
Le 27 septembre 2023, Zero Day Initiative (ZDI) a publié six avis de sécurité [1] concernant des vulnérabilités de type zéro-jour affectant les versions antérieures à 4.96.1 ou 4.97 de l'agent de transfert de courriels (Mail Transfer Agent ou MTA) Exim. Le 1er octobre 2023, l'éditeur a publié un avis de sécurité [2] contenant les détails des six vulnérabilités découvertes par ZDI.
L'éditeur annonce dans son bulletin du 1er octobre 2023 la correction, dans les versions 4.96.1 et 4.97 d'Exim, de trois vulnérabilités affectant la gestion de l'authentification :
- Les vulnérabilités identifiées CVE-2023-42114 et CVE-2023-42116 ayant respectivement un score CVSSv3 de 3.7 et 8.1 sont présentes dans le sous-système SPA/NTLM. Ce dernier introduit une faiblesse dans la validation des entrées utilisateurs lors du traitement des demandes de défis (challenges) NTLM. Un attaquant distant est en mesure de provoquer une atteinte à la confidentialité des données et une exécution de code arbitraire ;
- La vulnérabilité CVE-2023-42115, avec un score CVSSv3 de 9.8, est liée à l'implémentation du mécanisme EXTERNAL de la couche d'authentification et de sécurité simple (Simple Authentication and Security Layer ou SASL). Un manque de validation des données fournies par l'utilisateur permet à un attaquant distant de tenter une exécution de code arbitraire.
Cependant, à la date de publication initiale de cette alerte, l'éditeur ne propose pas de correctif pour les trois vulnérabilités suivantes :
- La vulnérabilité CVE-2023-42117 ayant un score CVSSv3 de 8.1 est liée à la gestion du protocole PROXY. Un manque de validation des données soumises par l'utilisateur peut permettre à un attaquant distant de compromettre l'intégrité des données en mémoire et de tenter une exécution de code arbitraire.
- La vulnérabilité identifiée CVE-2023-42118 a un score CVSSv3 de 7.5. Un attaquant adjacent au réseau peut tenter une exécution de code arbitraire vers les versions affectées de la bibliothèque libspf2 incluse dans Exim.
- Enfin, la vulnérabilité dont le numéro d'identification est CVE-2023-42119 est référencée avec un score CVSSv3 de 3.1. Elle est introduite par le sous-système de recherches DNS : un manque de validation des données fournies par l'utilisateur peut entraîner une lecture au-delà du tampon alloué. Un attaquant adjacent au réseau peut alors, en conjonction avec d'autres vulnérabilités, tenter une exécution de code arbitraire dans le contexte du compte de service.
Contournement provisoire
L'éditeur ne propose pas de correctif pour les trois vulnérabilités CVE-2023-42117, CVE-2023-42118 et CVE-2023-42119. Les mesures de contournement proposées consistent à :
- Pour CVE-2023-42117 : recourir à un relai (proxy) de confiance utilisant le protocole PROXY ;
- Pour CVE-2023-42118 : ne pas utiliser de macro spf dans les directives de configuration définissant les listes de contrôles d'accès (Access Control Lists ou ACL) ;
- Pour CVE-2023-42119 : utiliser un résolveur DNS de confiance, étant en mesure de valider les données en fonction des types d'enregistrements DNS. Cependant, la description du contournement proposé par l'éditeur ne permet pas de proposer un produit répondant à cette exigence.
Solution
Le CERT-FR incite fortement à mettre à jour Exim à la dernière version 4.96.1 ou 4.97 afin de corriger les vulnérabilités CVE-2023-42114, CVE-2023-42115 et CVE-2023-42116 dès la disponibilité des sources ou des paquets par l'éditeur ou les distributions Linux.
L'installation des correctifs pour les autres vulnérabilités devra être réalisée dès leur disponibilité.
Se référer au bulletin de sécurité de l'éditeur ou des distributions Linux pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Exim versions ant\u00e9rieures \u00e0 4.96.1 ou 4.97", "product": { "name": "N/A", "vendor": { "name": "Exim", "scada": false } } } ], "affected_systems_content": "", "closed_at": "2024-02-16", "content": "## Contournement provisoire\n\nL\u0027\u00e9diteur ne propose pas de correctif pour les trois vuln\u00e9rabilit\u00e9s\nCVE-2023-42117, CVE-2023-42118 et CVE-2023-42119. Les mesures de\ncontournement propos\u00e9es consistent \u00e0 :\n\n- Pour CVE-2023-42117 : recourir \u00e0 un relai (*proxy*) de confiance\n utilisant le protocole PROXY ;\n- Pour CVE-2023-42118 : ne pas utiliser de *macro* *spf* dans les\n directives de configuration d\u00e9finissant les listes de contr\u00f4les\n d\u0027acc\u00e8s (Access Control Lis*ts* ou *ACL*) ;\n- Pour CVE-2023-42119 : utiliser un r\u00e9solveur DNS de confiance, \u00e9tant\n en mesure de valider les donn\u00e9es en fonction des types\n d\u0027enregistrements DNS. Cependant, la description du contournement\n propos\u00e9 par l\u0027\u00e9diteur ne permet pas de proposer un produit r\u00e9pondant\n \u00e0 cette exigence.\n\n## Solution\n\nLe CERT-FR incite fortement \u00e0 mettre \u00e0 jour Exim \u00e0 la derni\u00e8re version\n4.96.1 ou 4.97 afin de corriger les vuln\u00e9rabilit\u00e9s CVE-2023-42114,\nCVE-2023-42115 et CVE-2023-42116 d\u00e8s la disponibilit\u00e9 des sources ou des\npaquets par l\u0027\u00e9diteur ou les distributions Linux.\n\nL\u0027installation des correctifs pour les autres vuln\u00e9rabilit\u00e9s devra \u00eatre\nr\u00e9alis\u00e9e d\u00e8s leur disponibilit\u00e9.\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur ou des distributions\nLinux pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-42118", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42118" }, { "name": "CVE-2023-42116", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42116" }, { "name": "CVE-2023-42115", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42115" }, { "name": "CVE-2023-42117", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42117" }, { "name": "CVE-2023-42119", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42119" }, { "name": "CVE-2023-42114", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42114" } ], "initial_release_date": "2023-10-02T00:00:00", "last_revision_date": "2024-02-16T00:00:00", "links": [], "reference": "CERTFR-2023-ALE-010", "revisions": [ { "description": "Version initiale", "revision_date": "2023-10-02T00:00:00.000000" }, { "description": "Cl\u00f4ture de l\u0027alerte. Cela ne signifie pas la fin d\u0027une menace. Seule l\u0027application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l\u0027exploitation de la vuln\u00e9rabilit\u00e9 correspondante.", "revision_date": "2024-02-16T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "Le 27 septembre 2023, Zero Day Initiative (ZDI) a publi\u00e9 six avis de\ns\u00e9curit\u00e9 \\[1\\] concernant des vuln\u00e9rabilit\u00e9s de type z\u00e9ro-jour affectant\nles versions ant\u00e9rieures \u00e0 4.96.1 ou 4.97 de l\u0027agent de transfert de\ncourriels (*Mail Transfer Agent* ou *MTA*) Exim. Le 1er octobre 2023,\nl\u0027\u00e9diteur a publi\u00e9 un avis de s\u00e9curit\u00e9 \\[2\\] contenant les d\u00e9tails des\nsix vuln\u00e9rabilit\u00e9s d\u00e9couvertes par ZDI.\n\nL\u0027\u00e9diteur annonce dans son bulletin du 1er octobre 2023 la\ncorrection,\u00a0dans les versions 4.96.1 et 4.97 d\u0027Exim, de trois\nvuln\u00e9rabilit\u00e9s affectant la gestion de l\u0027authentification :\n\n- Les vuln\u00e9rabilit\u00e9s identifi\u00e9es CVE-2023-42114 et CVE-2023-42116\n ayant respectivement un score *CVSSv3* de 3.7 et 8.1 sont pr\u00e9sentes\n dans le sous-syst\u00e8me *SPA/NTLM.* Ce dernier introduit une faiblesse\n dans la validation des entr\u00e9es utilisateurs lors du traitement des\n demandes de d\u00e9fis (*challenges*) *NTLM.* Un attaquant distant est en\n mesure de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et\n une ex\u00e9cution de code arbitraire ;\n- La vuln\u00e9rabilit\u00e9 CVE-2023-42115, avec un score *CVSSv3* de 9.8, est\n li\u00e9e \u00e0 l\u0027impl\u00e9mentation du m\u00e9canisme *EXTERNAL* de la couche\n d\u0027authentification et de s\u00e9curit\u00e9 simple (*Simple Authentication and\n Security Layer* ou *SASL*). Un manque de validation des donn\u00e9es\n fournies par l\u0027utilisateur permet \u00e0 un attaquant distant de tenter\n une ex\u00e9cution de code arbitraire.\n\nCependant, \u00e0 la date de publication initiale de cette alerte, l\u0027\u00e9diteur\nne propose pas de correctif pour les trois vuln\u00e9rabilit\u00e9s suivantes :\n\n- La vuln\u00e9rabilit\u00e9 CVE-2023-42117 ayant un score *CVSSv3* de 8.1 est\n li\u00e9e \u00e0 la gestion du protocole PROXY. Un manque de validation des\n donn\u00e9es soumises par l\u0027utilisateur peut permettre \u00e0 un attaquant\n distant de compromettre l\u0027int\u00e9grit\u00e9 des donn\u00e9es en m\u00e9moire et de\n tenter une ex\u00e9cution de code arbitraire.\n- La vuln\u00e9rabilit\u00e9 identifi\u00e9e CVE-2023-42118 a un score *CVSSv3* de\n 7.5. Un attaquant adjacent au r\u00e9seau peut tenter une ex\u00e9cution de\n code arbitraire vers les versions affect\u00e9es de la biblioth\u00e8que\n *libspf2* incluse dans Exim.\n- Enfin, la vuln\u00e9rabilit\u00e9 dont le num\u00e9ro d\u0027identification est\n CVE-2023-42119 est r\u00e9f\u00e9renc\u00e9e avec un score *CVSSv3* de 3.1. Elle\n est introduite par le sous-syst\u00e8me de recherches DNS : un manque de\n validation des donn\u00e9es fournies par l\u0027utilisateur peut entra\u00eener une\n lecture au-del\u00e0 du tampon allou\u00e9. Un attaquant adjacent au r\u00e9seau\n peut alors, en conjonction avec d\u0027autres vuln\u00e9rabilit\u00e9s, tenter une\n ex\u00e9cution de code arbitraire dans le contexte du compte de service.\n\n\u00a0\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Exim", "vendor_advisories": [ { "published_at": "2023-09-27", "title": "Bulletin de s\u00e9curit\u00e9 ZDI 23-1469", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1469/" }, { "published_at": "2023-09-27", "title": "Bulletin de s\u00e9curit\u00e9 ZDI 23-1470", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1470/" }, { "published_at": "2023-09-27", "title": "Bulletin de s\u00e9curit\u00e9 ZDI 23-1473", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1473/" }, { "published_at": "2023-09-27", "title": "Bulletin de s\u00e9curit\u00e9 ZDI 23-1472", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1472/" }, { "published_at": "2023-10-01", "title": "[2] Bulletin de s\u00e9curit\u00e9 Exim", "url": "https://www.exim.org/static/doc/security/CVE-2023-zdi.txt" }, { "published_at": "2023-09-27", "title": "[1] Bulletin de s\u00e9curit\u00e9 ZDI 23-1468", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1468/" }, { "published_at": "2023-09-27", "title": "Bulletin de s\u00e9curit\u00e9 ZDI 23-1471", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1471/" } ] }
fkie_cve-2023-42115
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
zdi-disclosures@trendmicro.com | https://www.zerodayinitiative.com/advisories/ZDI-23-1469/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-23-1469/ | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC8D7E21-6CC1-45EE-A100-AC7B6E0D9FC8", "versionEndExcluding": "4.96.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17434." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de escritura fuera de los l\u00edmites de Exim AUTH. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Exim. No se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio smtp, que escucha en el puerto TCP 25 de forma predeterminada. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura m\u00e1s all\u00e1 del final de un b\u00fafer. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la cuenta de servicio. Era ZDI-CAN-17434." } ], "id": "CVE-2023-42115", "lastModified": "2025-08-07T18:04:28.990", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "zdi-disclosures@trendmicro.com", "type": "Secondary" } ] }, "published": "2024-05-03T03:15:50.123", "references": [ { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1469/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1469/" } ], "sourceIdentifier": "zdi-disclosures@trendmicro.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "zdi-disclosures@trendmicro.com", "type": "Secondary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.