WID-SEC-W-2023-3206
Vulnerability from csaf_certbund - Published: 2023-12-21 23:00 - Updated: 2024-11-11 23:00Es existiert eine Schwachstelle in verschiedenen SMTP Implementierungen. Je nachdem, wie SMTP-Server/Software konfiguriert sind, um die End-of-Data-Sequenz zu interpretieren (z. B. CR+LF.CR+LF), kann ein Angreifer aus den Nachrichtendaten ausbrechen und SMTP-Befehle "einschmuggeln", um gefälschte E-Mails zu versenden, die die SPF-Prüfungen umgehen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Es existiert eine Schwachstelle in verschiedenen SMTP Implementierungen. Je nachdem, wie SMTP-Server/Software konfiguriert sind, um die End-of-Data-Sequenz zu interpretieren (z. B. CR+LF.CR+LF), kann ein Angreifer aus den Nachrichtendaten ausbrechen und SMTP-Befehle "einschmuggeln", um gefälschte E-Mails zu versenden, die die SPF-Prüfungen umgehen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Es existiert eine Schwachstelle in verschiedenen SMTP Implementierungen. Je nachdem, wie SMTP-Server/Software konfiguriert sind, um die End-of-Data-Sequenz zu interpretieren (z. B. CR+LF.CR+LF), kann ein Angreifer aus den Nachrichtendaten ausbrechen und SMTP-Befehle "einschmuggeln", um gefälschte E-Mails zu versenden, die die SPF-Prüfungen umgehen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Postfix ist ein Open Source Email Server f\u00fcr Linux und unix-basierte Betriebssysteme.\r\nSendmail ist ein Mail Transfer Agent f\u00fcr UNIX-Betriebssysteme.\r\nExim (EXperimental Internet Mailer) ist ein Mailserver und Mail Transfer Agent.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in verschiedenen SMTP Implementierungen ausnutzen, um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-3206 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-3206.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-3206 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3206"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3708 vom 2024-01-05",
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6611-1 vom 2024-01-29",
"url": "https://ubuntu.com/security/notices/USN-6611-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3725 vom 2024-01-30",
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00020.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6591-2 vom 2024-01-31",
"url": "https://ubuntu.com/security/notices/USN-6591-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-1914 vom 2024-02-06",
"url": "https://alas.aws.amazon.com/ALAS-2024-1914.html"
},
{
"category": "external",
"summary": "Red Hat Bugzilla vom 2023-12-21",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255563"
},
{
"category": "external",
"summary": "SECConsult Blog vom 2023-12-21",
"url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"
},
{
"category": "external",
"summary": "Postfix Patch vom 2023-12-21",
"url": "https://www.mail-archive.com/postfix-users@postfix.org/msg100901.html"
},
{
"category": "external",
"summary": "Github Advisory Database vom 2023-12-21",
"url": "https://github.com/advisories/GHSA-j5jm-hg4x-w8rx"
},
{
"category": "external",
"summary": "Red Hat Bugzilla vom 2023-12-27",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255852"
},
{
"category": "external",
"summary": "Red Hat Bugzilla vom 2023-12-27",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255869"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:4981-1 vom 2023-12-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017566.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-1908 vom 2024-01-23",
"url": "https://alas.aws.amazon.com/ALAS-2024-1908.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2420 vom 2024-01-23",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2420.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6591-1 vom 2024-01-22",
"url": "https://ubuntu.com/security/notices/USN-6591-1"
},
{
"category": "external",
"summary": "Postfix Advisory vom 2024-01-22",
"url": "https://www.postfix.org/smtp-smuggling.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-C839E7294F vom 2024-01-03",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c839e7294f"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-5C186175F2 vom 2024-01-03",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5c186175f2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0012-1 vom 2024-01-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017584.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0743-1 vom 2024-03-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018086.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0742-1 vom 2024-03-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018087.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-8EB8988CB8 vom 2024-01-03",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-8eb8988cb8"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-9BC09085C7 vom 2024-01-03",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-9bc09085c7"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-1EF6197A49 vom 2024-01-03",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-1ef6197a49"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-E0841C83BB vom 2024-01-03",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-e0841c83bb"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-54A5C04D0C vom 2024-01-03",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-54a5c04d0c"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5597 vom 2024-01-04",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00004.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1149-1 vom 2024-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018274.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7148150 vom 2024-04-11",
"url": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3829 vom 2024-06-15",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00004.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06",
"url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9243 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9243"
}
],
"source_lang": "en-US",
"title": "SMTP Implementierungen: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen",
"tracking": {
"current_release_date": "2024-11-11T23:00:00.000+00:00",
"generator": {
"date": "2024-11-12T12:17:22.693+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2023-3206",
"initial_release_date": "2023-12-21T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-12-21T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-12-26T23:00:00.000+00:00",
"number": "2",
"summary": "CVEs und Quellen erg\u00e4nzt."
},
{
"date": "2023-12-27T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-01-02T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Fedora und SUSE aufgenommen"
},
{
"date": "2024-01-03T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-01-04T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-01-07T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-01-22T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Amazon und Postfix aufgenommen"
},
{
"date": "2024-01-28T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-01-30T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-01-31T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-02-05T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-03-03T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-04-08T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-04-11T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-06-16T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-08-05T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "18"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T024663",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "EMC Avamar",
"product": {
"name": "EMC Avamar",
"product_id": "T014381",
"product_identification_helper": {
"cpe": "cpe:/a:emc:avamar:-"
}
}
}
],
"category": "vendor",
"name": "EMC"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM AIX 7.3",
"product_id": "1139691",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3"
}
}
},
{
"category": "product_version",
"name": "7.2",
"product": {
"name": "IBM AIX 7.2",
"product_id": "434967",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.2"
}
}
}
],
"category": "product_name",
"name": "AIX"
},
{
"branches": [
{
"category": "product_version",
"name": "3.1",
"product": {
"name": "IBM VIOS 3.1",
"product_id": "1039165",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:3.1"
}
}
},
{
"category": "product_version",
"name": "4.1",
"product": {
"name": "IBM VIOS 4.1",
"product_id": "1522854",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:4.1"
}
}
}
],
"category": "product_name",
"name": "VIOS"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Exim",
"product": {
"name": "Open Source Exim",
"product_id": "T007959",
"product_identification_helper": {
"cpe": "cpe:/a:exim:exim:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.9",
"product": {
"name": "Open Source Postfix \u003c3.9",
"product_id": "T031802"
}
},
{
"category": "product_version",
"name": "3.9",
"product": {
"name": "Open Source Postfix 3.9",
"product_id": "T031802-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:postfix:postfix:3.9"
}
}
}
],
"category": "product_name",
"name": "Postfix"
},
{
"category": "product_name",
"name": "Open Source sendmail",
"product": {
"name": "Open Source sendmail",
"product_id": "T031803",
"product_identification_helper": {
"cpe": "cpe:/a:sendmail:sendmail:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-51764",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in verschiedenen SMTP Implementierungen. Je nachdem, wie SMTP-Server/Software konfiguriert sind, um die End-of-Data-Sequenz zu interpretieren (z. B. CR+LF.CR+LF), kann ein Angreifer aus den Nachrichtendaten ausbrechen und SMTP-Befehle \"einschmuggeln\", um gef\u00e4lschte E-Mails zu versenden, die die SPF-Pr\u00fcfungen umgehen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"434967",
"T007959",
"1039165",
"1522854",
"74185",
"1139691",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"T031803",
"T031802",
"398363"
]
},
"release_date": "2023-12-21T23:00:00.000+00:00",
"title": "CVE-2023-51764"
},
{
"cve": "CVE-2023-51765",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in verschiedenen SMTP Implementierungen. Je nachdem, wie SMTP-Server/Software konfiguriert sind, um die End-of-Data-Sequenz zu interpretieren (z. B. CR+LF.CR+LF), kann ein Angreifer aus den Nachrichtendaten ausbrechen und SMTP-Befehle \"einschmuggeln\", um gef\u00e4lschte E-Mails zu versenden, die die SPF-Pr\u00fcfungen umgehen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"434967",
"T007959",
"1039165",
"1522854",
"74185",
"1139691",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"T031803",
"T031802",
"398363"
]
},
"release_date": "2023-12-21T23:00:00.000+00:00",
"title": "CVE-2023-51765"
},
{
"cve": "CVE-2023-51766",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in verschiedenen SMTP Implementierungen. Je nachdem, wie SMTP-Server/Software konfiguriert sind, um die End-of-Data-Sequenz zu interpretieren (z. B. CR+LF.CR+LF), kann ein Angreifer aus den Nachrichtendaten ausbrechen und SMTP-Befehle \"einschmuggeln\", um gef\u00e4lschte E-Mails zu versenden, die die SPF-Pr\u00fcfungen umgehen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"434967",
"T007959",
"1039165",
"1522854",
"74185",
"1139691",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"T031803",
"T031802",
"398363"
]
},
"release_date": "2023-12-21T23:00:00.000+00:00",
"title": "CVE-2023-51766"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.