Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-42115— Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability

EPSS 70.69% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-42115

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17434.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨界内存写
Source: NVD (National Vulnerability Database)
Vulnerability Title
Exim 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Exim是一个运行于Unix系统中的开源消息传送代理(MTA),它主要负责邮件的路由、转发和投递。 Exim存在安全漏洞,该漏洞源于缺乏对用户提供的数据进行正确验证,导致写入超出缓冲区末尾。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
EximExim exim 4.95 -

II. Public POCs for CVE-2023-42115

#POC DescriptionSource LinkShenlong Link
1PoC for Exim CVE-2023-42115 https://github.com/cammclain/CVE-2023-42115POC Details
2This module exploits a vulnerability in the target service identified as CVE-2023-42115. It sends a crafted payload to the vulnerable service to achieve a specific action.https://github.com/isotaka134/cve-2023-42115POC Details
3This module exploits a vulnerability in the target service identified as CVE-2023-42115.https://github.com/kirinse/cve-2023-42115POC Details
4A CVE-2023-42115 POChttps://github.com/AdaHop-Cyber-Security/PocyPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-42115

登录查看更多情报信息。

Same Patch Batch · Exim · 2024-05-03 · 6 CVEs total

CVE-2023-42114Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability
CVE-2023-42119Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability
CVE-2023-42118Exim libspf2 Integer Underflow Remote Code Execution Vulnerability
CVE-2023-42116Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-42117Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2023-42115

No comments yet


Leave a comment