CVE-2022-3620
Published: 20 October 2022
A vulnerability was found in Exim and classified as problematic. This issue affects the function dmarc_dns_lookup of the file dmarc.c of the component DMARC Handler. The manipulation leads to use after free. The attack may be initiated remotely. The name of the patch is 12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211919.
Notes
Author | Note |
---|---|
rodrigo-zaiden | vulnerable code was added in version 4.95-RC0, with commit 92583637b25b6bde926f9ca6be7b085e5ac8b1e6, so it doesn't affect releases prior to Jammy. DMARC support (EXPERIMENTAL_DMARC or SUPPORT_DMARC flags) is not built by default in Debian, so this issue is negligible in Ubuntu. |
Priority
Status
Package | Release | Status |
---|---|---|
exim4 Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(code not present)
|
focal |
Not vulnerable
(code not present)
|
|
jammy |
Not vulnerable
(code not compiled)
|
|
kinetic |
Not vulnerable
(code not compiled)
|
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Released
(4.96-7)
|
|
xenial |
Not vulnerable
(code not present)
|
|
Patches: upstream: https://git.exim.org/exim.git/commit/12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |