Bug 1215787 (CVE-2023-42117) - VUL-0: CVE-2023-42117: exim: Improper Neutralization of Special Elements Remote Code Execution Vulnerability
Summary: VUL-0: CVE-2023-42117: exim: Improper Neutralization of Special Elements Remo...
Status: RESOLVED FIXED
Alias: CVE-2023-42117
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.6
Hardware: Other Other
: P3 - Medium : Major (vote)
Target Milestone: ---
Assignee: Peter Wullinger
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/380210/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-09-28 06:37 UTC by SMASH SMASH
Modified: 2024-07-15 17:05 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-09-28 06:37:53 UTC
This vulnerability allows remote attackers to execute arbitrary code on affected
installations of Exim. Authentication is not required to exploit this
vulnerability.

The specific flaw exists within the smtp service, which listens on TCP port 25
by default. The issue results from the lack of proper validation of
user-supplied data, which can result in a memory corruption condition. An
attacker can leverage this vulnerability to execute code in the context of the
current process.

06/06/22 – ZDI requested a PSIRT contact.

06/14/22 – ZDI reported the vulnerability to the vendor.

04/25/23 – ZDI asked for an update.

04/25/23 – The vendor asked us to re-send the reports.

05/10/23 – ZDI sent the vulnerability to the vendor.

09/25/23 – ZDI asked for an update and informed the vendor that we intend to
publish the case as a zero-day advisory on 09/27/23.

-- Mitigation: Given the nature of the vulnerability, the only salient
mitigation strategy is to restrict interaction with the application.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42117
Comment 1 Peter Wullinger 2023-10-04 06:33:30 UTC
I do not see any upstream or details fixes for this issue.
Comment 2 OBSbugzilla Bot 2023-10-16 09:45:02 UTC
This is an autogenerated message for OBS integration:
This bug (1215787) was mentioned in
https://build.opensuse.org/request/show/1117952 Factory / exim
Comment 3 OBSbugzilla Bot 2023-10-18 08:25:03 UTC
This is an autogenerated message for OBS integration:
This bug (1215787) was mentioned in
https://build.opensuse.org/request/show/1118499 Backports:SLE-12-SP4 / exim
https://build.opensuse.org/request/show/1118502 Backports:SLE-15-SP4 / exim
https://build.opensuse.org/request/show/1118503 Backports:SLE-15-SP6 / exim
https://build.opensuse.org/request/show/1118504 Backports:SLE-15-SP5 / exim
Comment 4 Marcus Meissner 2023-10-18 16:05:13 UTC
openSUSE-SU-2023:0303-1: An update that fixes two vulnerabilities is now available.

Category: security (critical)
Bug References: 1215787,1215789
CVE References: CVE-2023-42117,CVE-2023-42119
JIRA References: 
Sources used:
openSUSE Backports SLE-15-SP5 (src):    exim-4.94.2-bp155.5.6.1
Comment 5 Marcus Meissner 2023-10-18 16:05:33 UTC
openSUSE-SU-2023:0304-1: An update that fixes two vulnerabilities is now available.

Category: security (critical)
Bug References: 1215787,1215789
CVE References: CVE-2023-42117,CVE-2023-42119
JIRA References: 
Sources used:
openSUSE Backports SLE-15-SP4 (src):    exim-4.94.2-bp154.2.9.1
Comment 6 Peter Wullinger 2023-10-19 09:33:51 UTC
Fixed via patch
Comment 7 OBSbugzilla Bot 2024-07-15 17:05:25 UTC
This is an autogenerated message for OBS integration:
This bug (1215787) was mentioned in
https://build.opensuse.org/request/show/1187597 Backports:SLE-15-SP6 / exim