CVE-2017-16943

Published: 27 November 2017

The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.

Priority

High

CVSS 3 base score: 9.8

Status

Package Release Status
exim4
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 18.04 LTS (Bionic Beaver)
Released (4.89-9ubuntu2)
Ubuntu 16.04 LTS (Xenial Xerus) Not vulnerable
(4.86.2-2ubuntu2.2)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(4.82-3ubuntu2.3)
Patches:
Upstream: https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4

Notes

AuthorNote
mdeslaur
only affects Exim 4.88 or newer

in zesty, the 78_Disable-chunking-BDAT-by-default.patch patch
sets chunking_advertise_hosts = by default, which disables the
security issue unless the local configurations changed the
default value.

Probably no code execution in Ubuntu because the exim binary
is built with PIE

References

Bugs