PT-2023-5613 · Exim+4 · Exim+4

Published

2023-09-27

·

Updated

2025-11-16

·

CVE-2023-42115

CVSS v2.0

10

Critical

AV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Exim (affected versions not specified)
Description This issue allows remote attackers to execute arbitrary code on affected installations of Exim. The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. It is estimated that more than 3.5 million Exim servers are potentially affected.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability. As a temporary workaround, consider restricting interaction with the application or limiting access to the server to minimize the risk of exploitation. Additionally, configuring Postfix as a proxy in front of Exim MTAs may be a possible workaround.

Exploit

RCE

Memory Corruption

Weakness Enumeration

Related Identifiers

ALT-PU-2023-7644
BDU:2023-06268
CVE-2023-42115
DSA-5512-1
OPENSUSE-SU-2023:0293-1
OPENSUSE-SU-2024:0007-1
OPENSUSE-SU-2024:13282-1
USN-6411-1
ZDI-23-1469

Affected Products

Exim
Linuxmint
Postfix
Red Os
Ubuntu