Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2022-3620

Published: 20 October 2022

A vulnerability was found in Exim and classified as problematic. This issue affects the function dmarc_dns_lookup of the file dmarc.c of the component DMARC Handler. The manipulation leads to use after free. The attack may be initiated remotely. The name of the patch is 12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211919.

Notes

AuthorNote
rodrigo-zaiden
vulnerable code was added in version 4.95-RC0, with commit
92583637b25b6bde926f9ca6be7b085e5ac8b1e6, so it doesn't
affect releases prior to Jammy.
DMARC support (EXPERIMENTAL_DMARC or SUPPORT_DMARC flags)
is not built by default in Debian, so this issue is
negligible in Ubuntu.

Priority

Negligible

Cvss 3 Severity Score

9.8

Score breakdown

Status

Package Release Status
exim4
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not present)
focal Not vulnerable
(code not present)
jammy Not vulnerable
(code not compiled)
kinetic Not vulnerable
(code not compiled)
trusty Not vulnerable
(code not present)
upstream
Released (4.96-7)
xenial Not vulnerable
(code not present)
Patches:
upstream: https://git.exim.org/exim.git/commit/12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445

Severity score breakdown

Parameter Value
Base score 9.8
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H