CVE-2017-16943

Priority
High
Description
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and
4.89 allows remote attackers to execute arbitrary code or cause a denial of
service (use-after-free) via vectors involving BDAT commands.
References
Bugs
Notes
 mdeslaur> only affects Exim 4.88 or newer
 mdeslaur>
 mdeslaur> in zesty, the 78_Disable-chunking-BDAT-by-default.patch patch
 mdeslaur> sets chunking_advertise_hosts = by default, which disables the
 mdeslaur> security issue unless the local configurations changed the
 mdeslaur> default value.
 mdeslaur>
 mdeslaur> Probably no code execution in Ubuntu because the exim binary
 mdeslaur> is built with PIE
Assigned-to
mdeslaur
Package
Source: exim4 (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (4.82-3ubuntu2.3)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.86.2-2ubuntu2.2)
Ubuntu 17.04 (Zesty Zapus):released (4.88-5ubuntu1.2)
Ubuntu 17.10 (Artful Aardvark):released (4.89-5ubuntu1.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (4.89-9ubuntu2)
Patches:
Upstream:https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4
More Information

Updated: 2017-12-15 20:35:44 UTC (commit 13913)