Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2023-42115
Vulnerability from cvelistv5
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "exim", vendor: "exim", versions: [ { lessThan: "4.95", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2023-42115", options: [ { Exploitation: "poc", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-20T19:32:20.272668Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-20T19:51:52.263Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T19:16:50.537Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "ZDI-23-1469", tags: [ "x_research-advisory", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-23-1469/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Exim", vendor: "Exim", versions: [ { status: "affected", version: "exim 4.95", }, ], }, ], dateAssigned: "2023-09-06T16:25:45.458-05:00", datePublic: "2023-09-27T17:21:04.217-05:00", descriptions: [ { lang: "en", value: "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17434.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-787", description: "CWE-787: Out-of-bounds Write", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-18T18:30:10.109Z", orgId: "99f1926a-a320-47d8-bbb5-42feb611262e", shortName: "zdi", }, references: [ { name: "ZDI-23-1469", tags: [ "x_research-advisory", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-23-1469/", }, ], source: { lang: "en", value: "Anonymous", }, title: "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "99f1926a-a320-47d8-bbb5-42feb611262e", assignerShortName: "zdi", cveId: "CVE-2023-42115", datePublished: "2024-05-03T02:13:23.745Z", dateReserved: "2023-09-06T21:14:24.435Z", dateUpdated: "2024-09-20T19:51:52.263Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { descriptions: "[{\"lang\": \"en\", \"value\": \"Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \\n\\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\\n. Was ZDI-CAN-17434.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de ejecuci\\u00f3n remota de c\\u00f3digo de escritura fuera de los l\\u00edmites de Exim AUTH. Esta vulnerabilidad permite a atacantes remotos ejecutar c\\u00f3digo arbitrario en las instalaciones afectadas de Exim. No se requiere autenticaci\\u00f3n para aprovechar esta vulnerabilidad. La falla espec\\u00edfica existe dentro del servicio smtp, que escucha en el puerto TCP 25 de forma predeterminada. El problema se debe a la falta de una validaci\\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura m\\u00e1s all\\u00e1 del final de un b\\u00fafer. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\\u00f3digo en el contexto de la cuenta de servicio. Era ZDI-CAN-17434.\"}]", id: "CVE-2023-42115", lastModified: "2024-11-21T08:22:18.330", metrics: "{\"cvssMetricV30\": [{\"source\": \"zdi-disclosures@trendmicro.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}]}", published: "2024-05-03T03:15:50.123", references: "[{\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-23-1469/\", \"source\": \"zdi-disclosures@trendmicro.com\"}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-23-1469/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", sourceIdentifier: "zdi-disclosures@trendmicro.com", vulnStatus: "Awaiting Analysis", weaknesses: "[{\"source\": \"zdi-disclosures@trendmicro.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2023-42115\",\"sourceIdentifier\":\"zdi-disclosures@trendmicro.com\",\"published\":\"2024-05-03T03:15:50.123\",\"lastModified\":\"2024-11-21T08:22:18.330\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \\n\\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\\n. Was ZDI-CAN-17434.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de ejecución remota de código de escritura fuera de los límites de Exim AUTH. Esta vulnerabilidad permite a atacantes remotos ejecutar código arbitrario en las instalaciones afectadas de Exim. No se requiere autenticación para aprovechar esta vulnerabilidad. La falla específica existe dentro del servicio smtp, que escucha en el puerto TCP 25 de forma predeterminada. El problema se debe a la falta de una validación adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura más allá del final de un búfer. Un atacante puede aprovechar esta vulnerabilidad para ejecutar código en el contexto de la cuenta de servicio. Era ZDI-CAN-17434.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"references\":[{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-23-1469/\",\"source\":\"zdi-disclosures@trendmicro.com\"},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-23-1469/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-23-1469/\", \"name\": \"ZDI-23-1469\", \"tags\": [\"x_research-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T19:16:50.537Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-42115\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-20T19:32:20.272668Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*\"], \"vendor\": \"exim\", \"product\": \"exim\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"4.95\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-06T18:08:50.835Z\"}}], \"cna\": {\"title\": \"Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability\", \"source\": {\"lang\": \"en\", \"value\": \"Anonymous\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}}], \"affected\": [{\"vendor\": \"Exim\", \"product\": \"Exim\", \"versions\": [{\"status\": \"affected\", \"version\": \"exim 4.95\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2023-09-27T17:21:04.217-05:00\", \"references\": [{\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-23-1469/\", \"name\": \"ZDI-23-1469\", \"tags\": [\"x_research-advisory\"]}], \"dateAssigned\": \"2023-09-06T16:25:45.458-05:00\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \\n\\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\\n. Was ZDI-CAN-17434.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787: Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"99f1926a-a320-47d8-bbb5-42feb611262e\", \"shortName\": \"zdi\", \"dateUpdated\": \"2024-09-18T18:30:10.109Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2023-42115\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-20T19:51:52.263Z\", \"dateReserved\": \"2023-09-06T21:14:24.435Z\", \"assignerOrgId\": \"99f1926a-a320-47d8-bbb5-42feb611262e\", \"datePublished\": \"2024-05-03T02:13:23.745Z\", \"assignerShortName\": \"zdi\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
wid-sec-w-2023-2505
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "kritisch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Exim (EXperimental Internet Mailer) ist ein Mailserver und Mail Transfer Agent.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Exim ausnutzen, um beliebigen Programmcode auszuführen oder Informationen offenzulegen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2505 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2505.json", }, { category: "self", summary: "WID-SEC-2023-2505 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2505", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202402-18 vom 2024-02-18", url: "https://security.gentoo.org/glsa/202402-18", }, { category: "external", summary: "IBM X-Force Exchange Advisory vom 2023-09-27", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/267177", }, { category: "external", summary: "IBM X-Force Exchange Advisory vom 2023-09-27", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/267176", }, { category: "external", summary: "IBM X-Force Exchange Advisory vom 2023-09-27", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/267175", }, { category: "external", summary: "IBM X-Force Exchange Advisory vom 2023-09-27", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/267173", }, { category: "external", summary: "IBM X-Force Exchange Advisory vom 2023-09-27", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/267172", }, { category: "external", summary: "IBM X-Force Exchange Advisory vom 2023-09-27", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/267168", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-B317DD9220 vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-b317dd9220", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2023-2EDA308E31 vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-2eda308e31", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-0A7690525F vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-0a7690525f", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-0ABCFEBECD vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-0abcfebecd", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-C737BEF4E1 vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-c737bef4e1", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-AE340C92EA vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-ae340c92ea", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-42313AF0DE vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-42313af0de", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-7F01E967AD vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-7f01e967ad", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2023-BFDE2B0C7C vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-bfde2b0c7c", }, { category: "external", summary: "Debian Security Advisory DLA-3599 vom 2023-10-02", url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00002.html", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2023-2661620873 vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-2661620873", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2023-BB93ECB59D vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-bb93ecb59d", }, { category: "external", summary: "Debian Security Advisory DSA-5512 vom 2023-10-02", url: "https://lists.debian.org/debian-security-announce/2023/msg00205.html", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2023-458A169F82 vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-458a169f82", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2023-35A1E9B1B2 vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-35a1e9b1b2", }, { category: "external", summary: "Ubuntu Security Notice USN-6411-1 vom 2023-10-04", url: "https://ubuntu.com/security/notices/USN-6411-1", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2023-1860 vom 2023-10-25", url: "https://alas.aws.amazon.com/ALAS-2023-1860.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6455-1 vom 2023-10-30", url: "https://ubuntu.com/security/notices/USN-6455-1", }, { category: "external", summary: "Debian Security Advisory DLA-3938 vom 2024-10-29", url: "https://lists.debian.org/debian-lts-announce/2024/10/msg00029.html", }, ], source_lang: "en-US", title: "Exim: Mehrere Schwachstellen", tracking: { current_release_date: "2024-10-28T23:00:00.000+00:00", generator: { date: "2024-10-29T09:07:25.637+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2023-2505", initial_release_date: "2023-09-27T22:00:00.000+00:00", revision_history: [ { date: "2023-09-27T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-10-03T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Fedora und Debian aufgenommen", }, { date: "2023-10-04T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2023-10-24T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-10-29T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-02-18T23:00:00.000+00:00", number: "6", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2024-10-28T23:00:00.000+00:00", number: "7", summary: "Neue Updates von Debian aufgenommen", }, ], status: "final", version: "7", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Fedora Linux", product: { name: "Fedora Linux", product_id: "74185", product_identification_helper: { cpe: "cpe:/o:fedoraproject:fedora:-", }, }, }, ], category: "vendor", name: "Fedora", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "Open Source Exim", product: { name: "Open Source Exim", product_id: "T007959", product_identification_helper: { cpe: "cpe:/a:exim:exim:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2023-42115", notes: [ { category: "description", text: "In Exim existieren mehrere Schwachstellen. Diese bestehen aufgrund von Problemen im smtp Service und aufgrund eines Stack-basierter Pufferüberlaufs, verursacht durch unsachgemäße Überprüfung der Grenzen bei der Verarbeitung von NTLM-Challenge-Anfragen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen.", }, ], product_status: { known_affected: [ "2951", "T000126", "T007959", "398363", "T012167", "74185", ], }, release_date: "2023-09-27T22:00:00.000+00:00", title: "CVE-2023-42115", }, { cve: "CVE-2023-42116", notes: [ { category: "description", text: "In Exim existieren mehrere Schwachstellen. Diese bestehen aufgrund von Problemen im smtp Service und aufgrund eines Stack-basierter Pufferüberlaufs, verursacht durch unsachgemäße Überprüfung der Grenzen bei der Verarbeitung von NTLM-Challenge-Anfragen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen.", }, ], product_status: { known_affected: [ "2951", "T000126", "T007959", "398363", "T012167", "74185", ], }, release_date: "2023-09-27T22:00:00.000+00:00", title: "CVE-2023-42116", }, { cve: "CVE-2023-42117", notes: [ { category: "description", text: "In Exim existieren mehrere Schwachstellen. Diese bestehen aufgrund von Problemen im smtp Service und aufgrund eines Stack-basierter Pufferüberlaufs, verursacht durch unsachgemäße Überprüfung der Grenzen bei der Verarbeitung von NTLM-Challenge-Anfragen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen.", }, ], product_status: { known_affected: [ "2951", "T000126", "T007959", "398363", "T012167", "74185", ], }, release_date: "2023-09-27T22:00:00.000+00:00", title: "CVE-2023-42117", }, { cve: "CVE-2023-42114", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Exim. Diese wird durch einen Fehler in der Behandlung von NTLM-Challenge-Anfragen verursacht. Ein entfernter, anonymer Angreifer kann das ausnutzen, um Informationen offenzulegen.", }, ], product_status: { known_affected: [ "2951", "T000126", "T007959", "398363", "T012167", "74185", ], }, release_date: "2023-09-27T22:00:00.000+00:00", title: "CVE-2023-42114", }, { cve: "CVE-2023-42118", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Exim. Die Ursache ist ein Fehler im Parsen von SPF-Makros. Ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um Code auszuführen.", }, ], product_status: { known_affected: [ "2951", "T000126", "T007959", "398363", "T012167", "74185", ], }, release_date: "2023-09-27T22:00:00.000+00:00", title: "CVE-2023-42118", }, { cve: "CVE-2023-42119", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Exim. Diese besteht aufgrund eines Fehlers im smtp-Dienst. Ein Angreifer aus dem angrenzenden Netzwerk kann das ausnutzen, um Informationen offenzulegen.", }, ], product_status: { known_affected: [ "2951", "T000126", "T007959", "398363", "T012167", "74185", ], }, release_date: "2023-09-27T22:00:00.000+00:00", title: "CVE-2023-42119", }, ], }
WID-SEC-W-2023-2505
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "kritisch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Exim (EXperimental Internet Mailer) ist ein Mailserver und Mail Transfer Agent.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Exim ausnutzen, um beliebigen Programmcode auszuführen oder Informationen offenzulegen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2505 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2505.json", }, { category: "self", summary: "WID-SEC-2023-2505 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2505", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202402-18 vom 2024-02-18", url: "https://security.gentoo.org/glsa/202402-18", }, { category: "external", summary: "IBM X-Force Exchange Advisory vom 2023-09-27", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/267177", }, { category: "external", summary: "IBM X-Force Exchange Advisory vom 2023-09-27", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/267176", }, { category: "external", summary: "IBM X-Force Exchange Advisory vom 2023-09-27", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/267175", }, { category: "external", summary: "IBM X-Force Exchange Advisory vom 2023-09-27", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/267173", }, { category: "external", summary: "IBM X-Force Exchange Advisory vom 2023-09-27", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/267172", }, { category: "external", summary: "IBM X-Force Exchange Advisory vom 2023-09-27", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/267168", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-B317DD9220 vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-b317dd9220", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2023-2EDA308E31 vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-2eda308e31", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-0A7690525F vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-0a7690525f", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-0ABCFEBECD vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-0abcfebecd", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-C737BEF4E1 vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-c737bef4e1", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-AE340C92EA vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-ae340c92ea", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-42313AF0DE vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-42313af0de", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-7F01E967AD vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-7f01e967ad", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2023-BFDE2B0C7C vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-bfde2b0c7c", }, { category: "external", summary: "Debian Security Advisory DLA-3599 vom 2023-10-02", url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00002.html", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2023-2661620873 vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-2661620873", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2023-BB93ECB59D vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-bb93ecb59d", }, { category: "external", summary: "Debian Security Advisory DSA-5512 vom 2023-10-02", url: "https://lists.debian.org/debian-security-announce/2023/msg00205.html", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2023-458A169F82 vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-458a169f82", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2023-35A1E9B1B2 vom 2023-10-02", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-35a1e9b1b2", }, { category: "external", summary: "Ubuntu Security Notice USN-6411-1 vom 2023-10-04", url: "https://ubuntu.com/security/notices/USN-6411-1", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2023-1860 vom 2023-10-25", url: "https://alas.aws.amazon.com/ALAS-2023-1860.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6455-1 vom 2023-10-30", url: "https://ubuntu.com/security/notices/USN-6455-1", }, { category: "external", summary: "Debian Security Advisory DLA-3938 vom 2024-10-29", url: "https://lists.debian.org/debian-lts-announce/2024/10/msg00029.html", }, ], source_lang: "en-US", title: "Exim: Mehrere Schwachstellen", tracking: { current_release_date: "2024-10-28T23:00:00.000+00:00", generator: { date: "2024-10-29T09:07:25.637+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2023-2505", initial_release_date: "2023-09-27T22:00:00.000+00:00", revision_history: [ { date: "2023-09-27T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-10-03T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Fedora und Debian aufgenommen", }, { date: "2023-10-04T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2023-10-24T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-10-29T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-02-18T23:00:00.000+00:00", number: "6", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2024-10-28T23:00:00.000+00:00", number: "7", summary: "Neue Updates von Debian aufgenommen", }, ], status: "final", version: "7", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Fedora Linux", product: { name: "Fedora Linux", product_id: "74185", product_identification_helper: { cpe: "cpe:/o:fedoraproject:fedora:-", }, }, }, ], category: "vendor", name: "Fedora", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "Open Source Exim", product: { name: "Open Source Exim", product_id: "T007959", product_identification_helper: { cpe: "cpe:/a:exim:exim:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2023-42115", notes: [ { category: "description", text: "In Exim existieren mehrere Schwachstellen. Diese bestehen aufgrund von Problemen im smtp Service und aufgrund eines Stack-basierter Pufferüberlaufs, verursacht durch unsachgemäße Überprüfung der Grenzen bei der Verarbeitung von NTLM-Challenge-Anfragen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen.", }, ], product_status: { known_affected: [ "2951", "T000126", "T007959", "398363", "T012167", "74185", ], }, release_date: "2023-09-27T22:00:00.000+00:00", title: "CVE-2023-42115", }, { cve: "CVE-2023-42116", notes: [ { category: "description", text: "In Exim existieren mehrere Schwachstellen. Diese bestehen aufgrund von Problemen im smtp Service und aufgrund eines Stack-basierter Pufferüberlaufs, verursacht durch unsachgemäße Überprüfung der Grenzen bei der Verarbeitung von NTLM-Challenge-Anfragen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen.", }, ], product_status: { known_affected: [ "2951", "T000126", "T007959", "398363", "T012167", "74185", ], }, release_date: "2023-09-27T22:00:00.000+00:00", title: "CVE-2023-42116", }, { cve: "CVE-2023-42117", notes: [ { category: "description", text: "In Exim existieren mehrere Schwachstellen. Diese bestehen aufgrund von Problemen im smtp Service und aufgrund eines Stack-basierter Pufferüberlaufs, verursacht durch unsachgemäße Überprüfung der Grenzen bei der Verarbeitung von NTLM-Challenge-Anfragen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen.", }, ], product_status: { known_affected: [ "2951", "T000126", "T007959", "398363", "T012167", "74185", ], }, release_date: "2023-09-27T22:00:00.000+00:00", title: "CVE-2023-42117", }, { cve: "CVE-2023-42114", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Exim. Diese wird durch einen Fehler in der Behandlung von NTLM-Challenge-Anfragen verursacht. Ein entfernter, anonymer Angreifer kann das ausnutzen, um Informationen offenzulegen.", }, ], product_status: { known_affected: [ "2951", "T000126", "T007959", "398363", "T012167", "74185", ], }, release_date: "2023-09-27T22:00:00.000+00:00", title: "CVE-2023-42114", }, { cve: "CVE-2023-42118", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Exim. Die Ursache ist ein Fehler im Parsen von SPF-Makros. Ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um Code auszuführen.", }, ], product_status: { known_affected: [ "2951", "T000126", "T007959", "398363", "T012167", "74185", ], }, release_date: "2023-09-27T22:00:00.000+00:00", title: "CVE-2023-42118", }, { cve: "CVE-2023-42119", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Exim. Diese besteht aufgrund eines Fehlers im smtp-Dienst. Ein Angreifer aus dem angrenzenden Netzwerk kann das ausnutzen, um Informationen offenzulegen.", }, ], product_status: { known_affected: [ "2951", "T000126", "T007959", "398363", "T012167", "74185", ], }, release_date: "2023-09-27T22:00:00.000+00:00", title: "CVE-2023-42119", }, ], }
opensuse-su-2023:0293-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for exim", title: "Title of the patch", }, { category: "description", text: "This update for exim fixes the following issues:\n\n\n* CVE-2023-42114: NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability (boo#1215784)\n* CVE-2023-42115: AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability (boo#1215785)\n* CVE-2023-42116: SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability (boo#1215786)\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-2023-293", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2023_0293-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2023:0293-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ULUNDOS6XEEFBG43DSBNULVEPHZ4YYJ/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2023:0293-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ULUNDOS6XEEFBG43DSBNULVEPHZ4YYJ/", }, { category: "self", summary: "SUSE Bug 1215784", url: "https://bugzilla.suse.com/1215784", }, { category: "self", summary: "SUSE Bug 1215785", url: "https://bugzilla.suse.com/1215785", }, { category: "self", summary: "SUSE Bug 1215786", url: "https://bugzilla.suse.com/1215786", }, { category: "self", summary: "SUSE CVE CVE-2023-42114 page", url: "https://www.suse.com/security/cve/CVE-2023-42114/", }, { category: "self", summary: "SUSE CVE CVE-2023-42115 page", url: "https://www.suse.com/security/cve/CVE-2023-42115/", }, { category: "self", summary: "SUSE CVE CVE-2023-42116 page", url: "https://www.suse.com/security/cve/CVE-2023-42116/", }, ], title: "Security update for exim", tracking: { current_release_date: "2023-10-05T09:26:19Z", generator: { date: "2023-10-05T09:26:19Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2023:0293-1", initial_release_date: "2023-10-05T09:26:19Z", revision_history: [ { date: "2023-10-05T09:26:19Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "exim-4.94.2-bp155.5.3.1.aarch64", product: { name: "exim-4.94.2-bp155.5.3.1.aarch64", product_id: "exim-4.94.2-bp155.5.3.1.aarch64", }, }, { category: "product_version", name: "eximon-4.94.2-bp155.5.3.1.aarch64", product: { name: "eximon-4.94.2-bp155.5.3.1.aarch64", product_id: "eximon-4.94.2-bp155.5.3.1.aarch64", }, }, { category: "product_version", name: "eximstats-html-4.94.2-bp155.5.3.1.aarch64", product: { name: "eximstats-html-4.94.2-bp155.5.3.1.aarch64", product_id: "eximstats-html-4.94.2-bp155.5.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "exim-4.94.2-bp155.5.3.1.ppc64le", product: { name: "exim-4.94.2-bp155.5.3.1.ppc64le", product_id: "exim-4.94.2-bp155.5.3.1.ppc64le", }, }, { category: "product_version", name: "eximon-4.94.2-bp155.5.3.1.ppc64le", product: { name: "eximon-4.94.2-bp155.5.3.1.ppc64le", product_id: "eximon-4.94.2-bp155.5.3.1.ppc64le", }, }, { category: "product_version", name: "eximstats-html-4.94.2-bp155.5.3.1.ppc64le", product: { name: "eximstats-html-4.94.2-bp155.5.3.1.ppc64le", product_id: "eximstats-html-4.94.2-bp155.5.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "exim-4.94.2-bp155.5.3.1.s390x", product: { name: "exim-4.94.2-bp155.5.3.1.s390x", product_id: "exim-4.94.2-bp155.5.3.1.s390x", }, }, { category: "product_version", name: "eximon-4.94.2-bp155.5.3.1.s390x", product: { name: "eximon-4.94.2-bp155.5.3.1.s390x", product_id: "eximon-4.94.2-bp155.5.3.1.s390x", }, }, { category: "product_version", name: "eximstats-html-4.94.2-bp155.5.3.1.s390x", product: { name: "eximstats-html-4.94.2-bp155.5.3.1.s390x", product_id: "eximstats-html-4.94.2-bp155.5.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "exim-4.94.2-bp155.5.3.1.x86_64", product: { name: "exim-4.94.2-bp155.5.3.1.x86_64", product_id: "exim-4.94.2-bp155.5.3.1.x86_64", }, }, { category: "product_version", name: "eximon-4.94.2-bp155.5.3.1.x86_64", product: { name: "eximon-4.94.2-bp155.5.3.1.x86_64", product_id: "eximon-4.94.2-bp155.5.3.1.x86_64", }, }, { category: "product_version", name: "eximstats-html-4.94.2-bp155.5.3.1.x86_64", product: { name: "eximstats-html-4.94.2-bp155.5.3.1.x86_64", product_id: "eximstats-html-4.94.2-bp155.5.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Package Hub 15 SP4", product: { name: "SUSE Package Hub 15 SP4", product_id: "SUSE Package Hub 15 SP4", }, }, { category: "product_name", name: "SUSE Package Hub 15 SP5", product: { name: "SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5", }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.aarch64 as component of SUSE Package Hub 15 SP4", product_id: "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", }, product_reference: "exim-4.94.2-bp155.5.3.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.ppc64le as component of SUSE Package Hub 15 SP4", product_id: "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", }, product_reference: "exim-4.94.2-bp155.5.3.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.s390x as component of SUSE Package Hub 15 SP4", product_id: "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", }, product_reference: "exim-4.94.2-bp155.5.3.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.x86_64 as component of SUSE Package Hub 15 SP4", product_id: "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", }, product_reference: "exim-4.94.2-bp155.5.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.aarch64 as component of SUSE Package Hub 15 SP4", product_id: "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", }, product_reference: "eximon-4.94.2-bp155.5.3.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.ppc64le as component of SUSE Package Hub 15 SP4", product_id: "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", }, product_reference: "eximon-4.94.2-bp155.5.3.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.s390x as component of SUSE Package Hub 15 SP4", product_id: "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", }, product_reference: "eximon-4.94.2-bp155.5.3.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.x86_64 as component of SUSE Package Hub 15 SP4", product_id: "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", }, product_reference: "eximon-4.94.2-bp155.5.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.aarch64 as component of SUSE Package Hub 15 SP4", product_id: "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.ppc64le as component of SUSE Package Hub 15 SP4", product_id: "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.s390x as component of SUSE Package Hub 15 SP4", product_id: "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.x86_64 as component of SUSE Package Hub 15 SP4", product_id: "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.aarch64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", }, product_reference: "exim-4.94.2-bp155.5.3.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.ppc64le as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", }, product_reference: "exim-4.94.2-bp155.5.3.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.s390x as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", }, product_reference: "exim-4.94.2-bp155.5.3.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.x86_64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", }, product_reference: "exim-4.94.2-bp155.5.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.aarch64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", }, product_reference: "eximon-4.94.2-bp155.5.3.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.ppc64le as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", }, product_reference: "eximon-4.94.2-bp155.5.3.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.s390x as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", }, product_reference: "eximon-4.94.2-bp155.5.3.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.x86_64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", }, product_reference: "eximon-4.94.2-bp155.5.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.aarch64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.ppc64le as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.s390x as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.x86_64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", }, product_reference: "exim-4.94.2-bp155.5.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", }, product_reference: "exim-4.94.2-bp155.5.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", }, product_reference: "exim-4.94.2-bp155.5.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", }, product_reference: "exim-4.94.2-bp155.5.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", }, product_reference: "eximon-4.94.2-bp155.5.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", }, product_reference: "eximon-4.94.2-bp155.5.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", }, product_reference: "eximon-4.94.2-bp155.5.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", }, product_reference: "eximon-4.94.2-bp155.5.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", }, product_reference: "exim-4.94.2-bp155.5.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", }, product_reference: "exim-4.94.2-bp155.5.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", }, product_reference: "exim-4.94.2-bp155.5.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "exim-4.94.2-bp155.5.3.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", }, product_reference: "exim-4.94.2-bp155.5.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", }, product_reference: "eximon-4.94.2-bp155.5.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", }, product_reference: "eximon-4.94.2-bp155.5.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", }, product_reference: "eximon-4.94.2-bp155.5.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.94.2-bp155.5.3.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", }, product_reference: "eximon-4.94.2-bp155.5.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.94.2-bp155.5.3.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", }, product_reference: "eximstats-html-4.94.2-bp155.5.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-42114", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42114", }, ], notes: [ { category: "general", text: "Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to disclose information in the context of the service account.\n. Was ZDI-CAN-17433.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42114", url: "https://www.suse.com/security/cve/CVE-2023-42114", }, { category: "external", summary: "SUSE Bug 1215784 for CVE-2023-42114", url: "https://bugzilla.suse.com/1215784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-10-05T09:26:19Z", details: "low", }, ], title: "CVE-2023-42114", }, { cve: "CVE-2023-42115", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42115", }, ], notes: [ { category: "general", text: "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17434.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42115", url: "https://www.suse.com/security/cve/CVE-2023-42115", }, { category: "external", summary: "SUSE Bug 1215785 for CVE-2023-42115", url: "https://bugzilla.suse.com/1215785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-10-05T09:26:19Z", details: "critical", }, ], title: "CVE-2023-42115", }, { cve: "CVE-2023-42116", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42116", }, ], notes: [ { category: "general", text: "Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17515.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42116", url: "https://www.suse.com/security/cve/CVE-2023-42116", }, { category: "external", summary: "SUSE Bug 1215786 for CVE-2023-42116", url: "https://bugzilla.suse.com/1215786", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:exim-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.94.2-bp155.5.3.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.4:eximstats-html-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:exim-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximon-4.94.2-bp155.5.3.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.94.2-bp155.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-10-05T09:26:19Z", details: "important", }, ], title: "CVE-2023-42116", }, ], }
opensuse-su-2024:0007-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for exim", title: "Title of the patch", }, { category: "description", text: "This update for exim fixes the following issues:\n\nexim was updated to 4.97.1 (boo#1218387, CVE-2023-51766):\n\n * Fixes for the smtp protocol smuggling (CVE-2023-51766)\n\nexim was updated to exim 4.96:\n\n * Move from using the pcre library to pcre2.\n * Constification work in the filters module required a major version\n bump for the local-scan API. Specifically, the 'headers_charset'\n global which is visible via the API is now const and may therefore\n not be modified by local-scan code.\n * Bug 2819: speed up command-line messages being read in. Previously a\n time check was being done for every character; replace that with one\n per buffer.\n * Bug 2815: Fix ALPN sent by server under OpenSSL. Previously the string\n sent was prefixed with a length byte.\n * Change the SMTP feature name for pipelining connect to be compliant with\n RFC 5321. Previously Dovecot (at least) would log errors during\n submission.\n * Fix macro-definition during '-be' expansion testing. The move to\n write-protected store for macros had not accounted for these runtime\n additions; fix by removing this protection for '-be' mode.\n * Convert all uses of select() to poll().\n * Fix use of $sender_host_name in daemon process. When used in certain\n main-section options or in a connect ACL, the value from the first ever\n connection was never replaced for subsequent connections.\n * Bug 2838: Fix for i32lp64 hard-align platforms\n * Bug 2845: Fix handling of tls_require_ciphers for OpenSSL when a value\n with underbars is given.\n * Bug 1895: TLS: Deprecate RFC 5114 Diffie-Hellman parameters.\n * Debugging initiated by an ACL control now continues through into routing\n and transport processes.\n * The 'expand' debug selector now gives more detail, specifically on the\n result of expansion operators and items.\n * Bug 2751: Fix include_directory in redirect routers. Previously a\n bad comparison between the option value and the name of the file to\n be included was done, and a mismatch was wrongly identified.\n * Support for Berkeley DB versions 1 and 2 is withdrawn.\n * When built with NDBM for hints DB's check for nonexistence of a name\n supplied as the db file-pair basename.\n * Remove the 'allow_insecure_tainted_data' main config option and the\n 'taint' log_selector.\n * Fix static address-list lookups to properly return the matched item.\n Previously only the domain part was returned.\n * The ${run} expansion item now expands its command string elements after\n splitting. Previously it was before; the new ordering makes handling\n zero-length arguments simpler.\n * Taint-check exec arguments for transport-initiated external processes.\n Previously, tainted values could be used. This affects 'pipe', 'lmtp' and\n 'queryprogram' transport, transport-filter, and ETRN commands.\n The ${run} expansion is also affected: in 'preexpand' mode no part of\n the command line may be tainted, in default mode the executable name\n may not be tainted.\n * Fix CHUNKING on a continued-transport. Previously the usabilility of\n the facility was not passed across execs, and only the first message\n passed over a connection could use BDAT; any further ones using DATA.\n * Support the PIPECONNECT facility in the smtp transport when the helo_data\n uses $sending_ip_address and an interface is specified.\n * OpenSSL: fix transport-required OCSP stapling verification under session\n resumption.\n * TLS resumption: the key for session lookup in the client now includes\n more info that a server could potentially use in configuring a TLS\n session, avoiding oferring mismatching sessions to such a server.\n * Fix string_copyn() for limit greater than actual string length.\n * Bug 2886: GnuTLS: Do not free the cached creds on transport connection\n close; it may be needed for a subsequent connection.\n * Fix CHUNKING for a second message on a connection when the first was\n rejected.\n * Fix ${srs_encode ...} to handle an empty sender address, now returning\n an empty address.\n * Bug 2855: Handle a v4mapped sender address given us by a frontending\n proxy.\n\nupdate to exim 4.95\n\n * includes taintwarn (taintwarn.patch)\n * fast-ramp queue run\n * native SRS\n * TLS resumption\n * LMDB lookups with single key\n * smtp transport option 'message_linelength_limit'\n * optionally ignore lookup caches\n * quota checking for appendfile transport during message reception\n * sqlite lookups allow a 'file=<path>' option\n * lsearch lookups allow a 'ret=full' option\n * command line option for the notifier socket\n * faster TLS startup\n * new main config option 'proxy_protocol_timeout'\n * expand 'smtp_accept_max_per_connection'\n * log selector 'queue_size_exclusive'\n * main config option 'smtp_backlog_monitor'\n * main config option 'hosts_require_helo'\n * main config option 'allow_insecure_tainted_data'", title: "Description of the patch", }, { category: "details", text: "openSUSE-2024-7", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0007-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2024:0007-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHLYW3QLWRHGQXVXSQUL2DBTCFFCJGNB/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2024:0007-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHLYW3QLWRHGQXVXSQUL2DBTCFFCJGNB/", }, { category: "self", summary: "SUSE Bug 1218387", url: "https://bugzilla.suse.com/1218387", }, { category: "self", summary: "SUSE CVE CVE-2022-3559 page", url: "https://www.suse.com/security/cve/CVE-2022-3559/", }, { category: "self", summary: "SUSE CVE CVE-2023-42114 page", url: "https://www.suse.com/security/cve/CVE-2023-42114/", }, { category: "self", summary: "SUSE CVE CVE-2023-42115 page", url: "https://www.suse.com/security/cve/CVE-2023-42115/", }, { category: "self", summary: "SUSE CVE CVE-2023-42116 page", url: "https://www.suse.com/security/cve/CVE-2023-42116/", }, { category: "self", summary: "SUSE CVE CVE-2023-42117 page", url: "https://www.suse.com/security/cve/CVE-2023-42117/", }, { category: "self", summary: "SUSE CVE CVE-2023-42119 page", url: "https://www.suse.com/security/cve/CVE-2023-42119/", }, { category: "self", summary: "SUSE CVE CVE-2023-51766 page", url: "https://www.suse.com/security/cve/CVE-2023-51766/", }, ], title: "Security update for exim", tracking: { current_release_date: "2024-01-03T20:12:49Z", generator: { date: "2024-01-03T20:12:49Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:0007-1", initial_release_date: "2024-01-03T20:12:49Z", revision_history: [ { date: "2024-01-03T20:12:49Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "exim-4.97.1-bp155.5.9.1.aarch64", product: { name: "exim-4.97.1-bp155.5.9.1.aarch64", product_id: "exim-4.97.1-bp155.5.9.1.aarch64", }, }, { category: "product_version", name: "eximon-4.97.1-bp155.5.9.1.aarch64", product: { name: "eximon-4.97.1-bp155.5.9.1.aarch64", product_id: "eximon-4.97.1-bp155.5.9.1.aarch64", }, }, { category: "product_version", name: "eximstats-html-4.97.1-bp155.5.9.1.aarch64", product: { name: "eximstats-html-4.97.1-bp155.5.9.1.aarch64", product_id: "eximstats-html-4.97.1-bp155.5.9.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "exim-4.97.1-bp155.5.9.1.ppc64le", product: { name: "exim-4.97.1-bp155.5.9.1.ppc64le", product_id: "exim-4.97.1-bp155.5.9.1.ppc64le", }, }, { category: "product_version", name: "eximon-4.97.1-bp155.5.9.1.ppc64le", product: { name: "eximon-4.97.1-bp155.5.9.1.ppc64le", product_id: "eximon-4.97.1-bp155.5.9.1.ppc64le", }, }, { category: "product_version", name: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", product: { name: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", product_id: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "exim-4.97.1-bp155.5.9.1.s390x", product: { name: "exim-4.97.1-bp155.5.9.1.s390x", product_id: "exim-4.97.1-bp155.5.9.1.s390x", }, }, { category: "product_version", name: "eximon-4.97.1-bp155.5.9.1.s390x", product: { name: "eximon-4.97.1-bp155.5.9.1.s390x", product_id: "eximon-4.97.1-bp155.5.9.1.s390x", }, }, { category: "product_version", name: "eximstats-html-4.97.1-bp155.5.9.1.s390x", product: { name: "eximstats-html-4.97.1-bp155.5.9.1.s390x", product_id: "eximstats-html-4.97.1-bp155.5.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "exim-4.97.1-bp155.5.9.1.x86_64", product: { name: "exim-4.97.1-bp155.5.9.1.x86_64", product_id: "exim-4.97.1-bp155.5.9.1.x86_64", }, }, { category: "product_version", name: "eximon-4.97.1-bp155.5.9.1.x86_64", product: { name: "eximon-4.97.1-bp155.5.9.1.x86_64", product_id: "eximon-4.97.1-bp155.5.9.1.x86_64", }, }, { category: "product_version", name: "eximstats-html-4.97.1-bp155.5.9.1.x86_64", product: { name: "eximstats-html-4.97.1-bp155.5.9.1.x86_64", product_id: "eximstats-html-4.97.1-bp155.5.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Package Hub 15 SP5", product: { name: "SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5", }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.aarch64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", }, product_reference: "exim-4.97.1-bp155.5.9.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.ppc64le as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", }, product_reference: "exim-4.97.1-bp155.5.9.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.s390x as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", }, product_reference: "exim-4.97.1-bp155.5.9.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.x86_64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", }, product_reference: "exim-4.97.1-bp155.5.9.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.aarch64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", }, product_reference: "eximon-4.97.1-bp155.5.9.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.ppc64le as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", }, product_reference: "eximon-4.97.1-bp155.5.9.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.s390x as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", }, product_reference: "eximon-4.97.1-bp155.5.9.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.x86_64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", }, product_reference: "eximon-4.97.1-bp155.5.9.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.aarch64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.s390x as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.x86_64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", }, product_reference: "exim-4.97.1-bp155.5.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", }, product_reference: "exim-4.97.1-bp155.5.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", }, product_reference: "exim-4.97.1-bp155.5.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "exim-4.97.1-bp155.5.9.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", }, product_reference: "exim-4.97.1-bp155.5.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", }, product_reference: "eximon-4.97.1-bp155.5.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", }, product_reference: "eximon-4.97.1-bp155.5.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", }, product_reference: "eximon-4.97.1-bp155.5.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximon-4.97.1-bp155.5.9.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", }, product_reference: "eximon-4.97.1-bp155.5.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.97.1-bp155.5.9.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", }, product_reference: "eximstats-html-4.97.1-bp155.5.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2022-3559", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3559", }, ], notes: [ { category: "general", text: "A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3559", url: "https://www.suse.com/security/cve/CVE-2022-3559", }, { category: "external", summary: "SUSE Bug 1204427 for CVE-2022-3559", url: "https://bugzilla.suse.com/1204427", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "important", }, ], title: "CVE-2022-3559", }, { cve: "CVE-2023-42114", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42114", }, ], notes: [ { category: "general", text: "Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to disclose information in the context of the service account.\n. Was ZDI-CAN-17433.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42114", url: "https://www.suse.com/security/cve/CVE-2023-42114", }, { category: "external", summary: "SUSE Bug 1215784 for CVE-2023-42114", url: "https://bugzilla.suse.com/1215784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "low", }, ], title: "CVE-2023-42114", }, { cve: "CVE-2023-42115", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42115", }, ], notes: [ { category: "general", text: "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17434.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42115", url: "https://www.suse.com/security/cve/CVE-2023-42115", }, { category: "external", summary: "SUSE Bug 1215785 for CVE-2023-42115", url: "https://bugzilla.suse.com/1215785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "critical", }, ], title: "CVE-2023-42115", }, { cve: "CVE-2023-42116", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42116", }, ], notes: [ { category: "general", text: "Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17515.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42116", url: "https://www.suse.com/security/cve/CVE-2023-42116", }, { category: "external", summary: "SUSE Bug 1215786 for CVE-2023-42116", url: "https://bugzilla.suse.com/1215786", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "important", }, ], title: "CVE-2023-42116", }, { cve: "CVE-2023-42117", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42117", }, ], notes: [ { category: "general", text: "Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17554.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42117", url: "https://www.suse.com/security/cve/CVE-2023-42117", }, { category: "external", summary: "SUSE Bug 1215787 for CVE-2023-42117", url: "https://bugzilla.suse.com/1215787", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "important", }, ], title: "CVE-2023-42117", }, { cve: "CVE-2023-42119", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42119", }, ], notes: [ { category: "general", text: "Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the service account.\n. Was ZDI-CAN-17643.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42119", url: "https://www.suse.com/security/cve/CVE-2023-42119", }, { category: "external", summary: "SUSE Bug 1215789 for CVE-2023-42119", url: "https://bugzilla.suse.com/1215789", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "low", }, ], title: "CVE-2023-42119", }, { cve: "CVE-2023-51766", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-51766", }, ], notes: [ { category: "general", text: "Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-51766", url: "https://www.suse.com/security/cve/CVE-2023-51766", }, { category: "external", summary: "SUSE Bug 1218387 for CVE-2023-51766", url: "https://bugzilla.suse.com/1218387", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:exim-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximon-4.97.1-bp155.5.9.1.x86_64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "SUSE Package Hub 15 SP5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:exim-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximon-4.97.1-bp155.5.9.1.x86_64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.aarch64", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.ppc64le", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.s390x", "openSUSE Leap 15.5:eximstats-html-4.97.1-bp155.5.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-03T20:12:49Z", details: "moderate", }, ], title: "CVE-2023-51766", }, ], }
opensuse-su-2024:13282-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "exim-4.96.1-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the exim-4.96.1-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-13282", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13282-1.json", }, { category: "self", summary: "SUSE CVE CVE-2023-42114 page", url: "https://www.suse.com/security/cve/CVE-2023-42114/", }, { category: "self", summary: "SUSE CVE CVE-2023-42115 page", url: "https://www.suse.com/security/cve/CVE-2023-42115/", }, { category: "self", summary: "SUSE CVE CVE-2023-42116 page", url: "https://www.suse.com/security/cve/CVE-2023-42116/", }, ], title: "exim-4.96.1-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:13282-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "exim-4.96.1-1.1.aarch64", product: { name: "exim-4.96.1-1.1.aarch64", product_id: "exim-4.96.1-1.1.aarch64", }, }, { category: "product_version", name: "eximon-4.96.1-1.1.aarch64", product: { name: "eximon-4.96.1-1.1.aarch64", product_id: "eximon-4.96.1-1.1.aarch64", }, }, { category: "product_version", name: "eximstats-html-4.96.1-1.1.aarch64", product: { name: "eximstats-html-4.96.1-1.1.aarch64", product_id: "eximstats-html-4.96.1-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "exim-4.96.1-1.1.ppc64le", product: { name: "exim-4.96.1-1.1.ppc64le", product_id: "exim-4.96.1-1.1.ppc64le", }, }, { category: "product_version", name: "eximon-4.96.1-1.1.ppc64le", product: { name: "eximon-4.96.1-1.1.ppc64le", product_id: "eximon-4.96.1-1.1.ppc64le", }, }, { category: "product_version", name: "eximstats-html-4.96.1-1.1.ppc64le", product: { name: "eximstats-html-4.96.1-1.1.ppc64le", product_id: "eximstats-html-4.96.1-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "exim-4.96.1-1.1.s390x", product: { name: "exim-4.96.1-1.1.s390x", product_id: "exim-4.96.1-1.1.s390x", }, }, { category: "product_version", name: "eximon-4.96.1-1.1.s390x", product: { name: "eximon-4.96.1-1.1.s390x", product_id: "eximon-4.96.1-1.1.s390x", }, }, { category: "product_version", name: "eximstats-html-4.96.1-1.1.s390x", product: { name: "eximstats-html-4.96.1-1.1.s390x", product_id: "eximstats-html-4.96.1-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "exim-4.96.1-1.1.x86_64", product: { name: "exim-4.96.1-1.1.x86_64", product_id: "exim-4.96.1-1.1.x86_64", }, }, { category: "product_version", name: "eximon-4.96.1-1.1.x86_64", product: { name: "eximon-4.96.1-1.1.x86_64", product_id: "eximon-4.96.1-1.1.x86_64", }, }, { category: "product_version", name: "eximstats-html-4.96.1-1.1.x86_64", product: { name: "eximstats-html-4.96.1-1.1.x86_64", product_id: "eximstats-html-4.96.1-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "exim-4.96.1-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", }, product_reference: "exim-4.96.1-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "exim-4.96.1-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", }, product_reference: "exim-4.96.1-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "exim-4.96.1-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", }, product_reference: "exim-4.96.1-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "exim-4.96.1-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", }, product_reference: "exim-4.96.1-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "eximon-4.96.1-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", }, product_reference: "eximon-4.96.1-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "eximon-4.96.1-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", }, product_reference: "eximon-4.96.1-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "eximon-4.96.1-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", }, product_reference: "eximon-4.96.1-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "eximon-4.96.1-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", }, product_reference: "eximon-4.96.1-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.96.1-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", }, product_reference: "eximstats-html-4.96.1-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.96.1-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", }, product_reference: "eximstats-html-4.96.1-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.96.1-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", }, product_reference: "eximstats-html-4.96.1-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "eximstats-html-4.96.1-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64", }, product_reference: "eximstats-html-4.96.1-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2023-42114", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42114", }, ], notes: [ { category: "general", text: "Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to disclose information in the context of the service account.\n. Was ZDI-CAN-17433.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42114", url: "https://www.suse.com/security/cve/CVE-2023-42114", }, { category: "external", summary: "SUSE Bug 1215784 for CVE-2023-42114", url: "https://bugzilla.suse.com/1215784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2023-42114", }, { cve: "CVE-2023-42115", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42115", }, ], notes: [ { category: "general", text: "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17434.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42115", url: "https://www.suse.com/security/cve/CVE-2023-42115", }, { category: "external", summary: "SUSE Bug 1215785 for CVE-2023-42115", url: "https://bugzilla.suse.com/1215785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2023-42115", }, { cve: "CVE-2023-42116", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42116", }, ], notes: [ { category: "general", text: "Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17515.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42116", url: "https://www.suse.com/security/cve/CVE-2023-42116", }, { category: "external", summary: "SUSE Bug 1215786 for CVE-2023-42116", url: "https://bugzilla.suse.com/1215786", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:exim-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:exim-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:exim-4.96.1-1.1.s390x", "openSUSE Tumbleweed:exim-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximon-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximon-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximon-4.96.1-1.1.x86_64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.aarch64", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.ppc64le", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.s390x", "openSUSE Tumbleweed:eximstats-html-4.96.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2023-42116", }, ], }
fkie_cve-2023-42115
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ cveTags: [], descriptions: [ { lang: "en", value: "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.\n. Was ZDI-CAN-17434.", }, { lang: "es", value: "Vulnerabilidad de ejecución remota de código de escritura fuera de los límites de Exim AUTH. Esta vulnerabilidad permite a atacantes remotos ejecutar código arbitrario en las instalaciones afectadas de Exim. No se requiere autenticación para aprovechar esta vulnerabilidad. La falla específica existe dentro del servicio smtp, que escucha en el puerto TCP 25 de forma predeterminada. El problema se debe a la falta de una validación adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura más allá del final de un búfer. Un atacante puede aprovechar esta vulnerabilidad para ejecutar código en el contexto de la cuenta de servicio. Era ZDI-CAN-17434.", }, ], id: "CVE-2023-42115", lastModified: "2024-11-21T08:22:18.330", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "zdi-disclosures@trendmicro.com", type: "Secondary", }, ], }, published: "2024-05-03T03:15:50.123", references: [ { source: "zdi-disclosures@trendmicro.com", url: "https://www.zerodayinitiative.com/advisories/ZDI-23-1469/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.zerodayinitiative.com/advisories/ZDI-23-1469/", }, ], sourceIdentifier: "zdi-disclosures@trendmicro.com", vulnStatus: "Awaiting Analysis", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "zdi-disclosures@trendmicro.com", type: "Secondary", }, ], }
ghsa-67rj-8f2h-26fc
Vulnerability from github
Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-17434.
{ affected: [], aliases: [ "CVE-2023-42115", ], database_specific: { cwe_ids: [ "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2024-05-03T03:15:50Z", severity: "CRITICAL", }, details: "Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-17434.", id: "GHSA-67rj-8f2h-26fc", modified: "2024-05-03T03:31:02Z", published: "2024-05-03T03:31:02Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-42115", }, { type: "WEB", url: "https://www.zerodayinitiative.com/advisories/ZDI-23-1469", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
gsd-2023-42115
Vulnerability from gsd
{ GSD: { alias: "CVE-2023-42115", id: "GSD-2023-42115", }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2023-42115", ], id: "GSD-2023-42115", modified: "2023-12-13T01:20:21.715407Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2023-42115", STATE: "RESERVED", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", }, ], }, }, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.