CVE-2017-16943

NameCVE-2017-16943
DescriptionThe receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-4053-1
Debian Bugs882648

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
exim4 (PTS)buster4.92-8+deb10u6fixed
buster (security)4.92-8+deb10u9fixed
bullseye (security), bullseye4.94.2-7+deb11u2fixed
bookworm, bookworm (security)4.96-15+deb12u4fixed
sid, trixie4.97-8fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
exim4sourcewheezy(not affected)
exim4sourcejessie(not affected)
exim4sourcestretch4.89-2+deb9u2DSA-4053-1
exim4source(unstable)4.89-12882648

Notes

[jessie] - exim4 <not-affected> (ESMTP CHUNKING extension introduced in 4.88)
[wheezy] - exim4 <not-affected> (ESMTP CHUNKING extension introduced in 4.88)
https://bugs.exim.org/show_bug.cgi?id=2199
https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4
https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html
https://twitter.com/philpennock/status/934270613811875840
4.89-10 adds a workaround which disables the affected code by default

Search for package or bug name: Reporting problems