SB2022082219 - Multiple vulnerabilities in Exim



SB2022082219 - Multiple vulnerabilities in Exim

Published: August 22, 2022 Updated: March 20, 2023

Security Bulletin ID SB2022082219
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Heap-based buffer overflow (CVE-ID: CVE-2022-37452)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error for the alias list within the host_name_lookup() function in host.c when the sender_host_name is set. A remote attacker can initiate a connection to the affected server, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Man-in-the-Middle (MitM) attack (CVE-ID: CVE-2021-38371)

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to the way Exim handles concurrent STARTTLS sessions when sending out emails. A malicious server can send a response to the *next* command within the existing STARTTLS sessions and force the Exim to treat this session as trusted.


Remediation

Install update from vendor's website.