3 Six 0day exploits were filed against Exim.
5 None of these issues is related to transport security (TLS) being
8 * 3 of them are related to SPA/NTLM, and EXTERNAL auth. If you do not
9 use SPA/NTLM, or EXTERNAL authentication, you're not affected. These
12 * One issue is related to data received from a proxy-protocol proxy. If
13 you do not use a proxy in front of Exim, you're not affected. If your
14 proxy is trustworthy, you're not affected. This issue is fixed.
16 * One is related to libspf2. If you do not use the `spf` lookup type or
17 the `spf` ACL condition, you are not affected.
19 * The last one is related to DNS lookups. If you use a trustworthy
20 resolver (which does validation of the data it receives), you're not
21 affected. This issue is fixed.
25 - 2023-10-03 12:00 UTC
26 - The available fixes are published.
27 - A security release exim-4.96.1 is published.
28 - The major distributions follow.
30 - 2023-10-15 15:45 UTC
31 - Security release exim-4.96.2 is published (sources only)
32 - Distros will follow.
37 - tag exim-4.96.2 (based on exim-4.96) [gpg signed]
38 - branch exim-4.96.2+fixes (based on exim-4.96.2 with the fixes from exim-4.96+fixes) [gpg signed]
40 - tarballs for exim-4.96.2: https://ftp.exim.org/pub/exim/exim4/ [gpg signed]
42 GPG signatures are made by me (hs@schlittermann.de, or Jeremy Harris
49 ZDI-23-1468 | ZDI-CAN-17433 | CVE-2023-42114 | Exim bug 3001
50 ------------------------------------------------------------
51 Subject: NTLM Challenge Out-Of-Bounds Read
53 Mitigation: Do not use SPA (NTLM) authentication
55 Fixed: 04107e98d, >= 4.96.1, 4.97
57 ZDI-23-1469 | ZDI-CAN-17434 | CVE-2023-42115 | Exim bug 2999
58 ------------------------------------------------------------
59 Subject: AUTH Out-Of-Bounds Write
61 Mitigation: Do not offer EXTERNAL authentication.
62 Subsystem: EXTERNAL auth
63 Fixed: 7bb5bc2c6, >= 4.96.1, 4.97
65 ZDI-23-1470 | ZDI-CAN-17515 | CVE-2023-42116 | Exim bug 3000
66 ------------------------------------------------------------
67 Subject: SMTP Challenge Stack-based Buffer Overflow
69 Mitigation: Do not use SPA (NTLM) authentication
71 Fixed: e17b8b0f1, >= 4.96.1, 4.97
73 ZDI-23-1471 | ZDI-CAN-17554 | CVE-2023-42117 | Exim Bug 3031
74 -------------------------------------------------------------
75 Subject: Improper Neutralization of Special Elements
77 Mitigation: Do not use Exim behind an untrusted proxy-protocol proxy
78 Subsystem: proxy protocol (not socks!)
79 Fix: a355463cf, >= 4.96.2, 4.97
81 ZDI-23-1472 | ZDI-CAN-17578 | CVE-2023-42118 | Exim Bug 3032
82 ------------------------------------------------------------
83 Subject: libspf2 Integer Underflow
85 Mitigation: Do not use the `spf` condition in your ACL
87 Remark: This CVE should be filed against libspf2.
88 See: https://github.com/shevek/libspf2/issues/45
90 ZDI-23-1473 | ZDI-CAN-17643 | CVE-2023-42119 | Exim Bug 3033
91 ------------------------------------------------------------
92 Subject: dnsdb Out-Of-Bounds Read
94 Mitigation: Use a trustworthy DNS resolver which is able to
95 validate the data according to the DNS record types.
96 Subsystem: dns lookups
97 Fix: f6b1f8e7d, >= 4.96.2, 4.97