PT-2022-6998 · Exim+4 · Exim+4

Published

2022-06-06

·

Updated

2025-08-07

·

CVE-2023-42116

CVSS v3.1

9.8

Critical

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Exim (affected versions not specified)
Description This issue allows remote attackers to execute arbitrary code on affected installations of Exim. The specific flaw exists within the handling of NTLM challenge requests, resulting from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this issue to execute code in the context of the service account. Authentication is not required to exploit this issue.
Recommendations At the moment, there is no information about a newer version that contains a fix for this issue.

Exploit

Fix

RCE

Buffer Overflow

Stack Overflow

Weakness Enumeration

Related Identifiers

ALT-PU-2023-7644
BDU:2023-06278
CVE-2023-42116
DLA-3599-1
DSA-5512-1
OPENSUSE-SU-2023:0293-1
OPENSUSE-SU-2024:0007-1
OPENSUSE-SU-2024:13282-1
USN-6411-1
ZDI-23-1470

Affected Products

Astra Linux
Exim
Linuxmint
Red Os
Ubuntu