CVE-2023-51766
moderate-risk
Published 2023-12-24
Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
Do I need to act?
~
1.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (7)
Affected Vendors
References (42)
Issue Tracking
https://bugs.exim.org/show_bug.cgi?id=3063
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2255852
Technical Description
https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html
Third Party Advisory
https://lwn.net/Articles/956533/
Technical Description
https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
Issue Tracking
https://www.openwall.com/lists/oss-security/2023/12/23/2
and 22 more references
39
/ 100
moderate-risk
Severity
21/34 · High
Exploitability
4/34 · Minimal
Exposure
14/34 · Moderate