CVE-2017-16943

Priority
Description
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and
4.89 allows remote attackers to execute arbitrary code or cause a denial of
service (use-after-free) via vectors involving BDAT commands.
Assigned-to
mdeslaur
Notes
mdeslauronly affects Exim 4.88 or newer

in zesty, the 78_Disable-chunking-BDAT-by-default.patch patch
sets chunking_advertise_hosts = by default, which disables the
security issue unless the local configurations changed the
default value.

Probably no code execution in Ubuntu because the exim binary
is built with PIE
Package
Source: exim4 (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (4.82-3ubuntu2.3)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.86.2-2ubuntu2.2)
Ubuntu 18.04 LTS (Bionic Beaver):released (4.89-9ubuntu2)
Patches:
Upstream:https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4
More Information

Updated: 2019-12-05 18:48:29 UTC (commit dd38ff22974aae499eb50644b9d5a2817483cbdb)