ALT-PU-2023-7710-1

Обновление пакета exim в ветке sisyphus_e2k

Версия4.97-alt1
Задание#0
Опубликовано2023-11-30
Макс. серьёзностьCRITICAL
Серьёзность:

Закрытые проблемы (4)

BDU:2023-06277
LOW3.7

Уязвимость реализации протокола NTLM (New Technology LAN Manager) почтового сервера Exim, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

Опубликовано: 2023-10-04Изменено: 2026-01-20
CVSS 3.xНИЗКАЯ 3.7
CVSS:3.x/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.0НИЗКАЯ 2.6
CVSS:2.0/AV:N/AC:H/Au:N/C:P/I:N/A:N
BDU:2023-06278
HIGH8.1

Уязвимость реализации протокола SMTP почтового сервера Exim, позволяющая нарушителю выполнить произвольный код

Опубликовано: 2023-10-04Изменено: 2025-01-29
CVSS 3.xВЫСОКАЯ 8.1
CVSS:3.x/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.0ВЫСОКАЯ 7.6
CVSS:2.0/AV:N/AC:H/Au:N/C:C/I:C/A:C
CVE-2023-42114
MEDIUM5.3

Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to disclose information in the context of the service account. . Was ZDI-CAN-17433.

Опубликовано: 2024-05-03Изменено: 2025-11-04
CVSS 3.xСРЕДНЯЯ 5.3
CVSS:3.x/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2023-42116
CRITICAL9.8

Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17515.

Опубликовано: 2024-05-03Изменено: 2025-11-04
CVSS 3.xКРИТИЧЕСКАЯ 9.8
CVSS:3.x/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H