PT-2022-6998 · Exim+4 · Exim+4
Published
2022-06-06
·
Updated
2025-08-07
·
CVE-2023-42116
CVSS v3.1
9.8
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Exim (affected versions not specified)
Description
This issue allows remote attackers to execute arbitrary code on affected installations of Exim. The specific flaw exists within the handling of NTLM challenge requests, resulting from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this issue to execute code in the context of the service account. Authentication is not required to exploit this issue.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this issue.
Exploit
Fix
RCE
Buffer Overflow
Stack Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Astra Linux
Exim
Linuxmint
Red Os
Ubuntu