CVE-2023-42118

NameCVE-2023-42118
DescriptionExim libspf2 Integer Underflow Remote Code Execution Vulnerability
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1053870

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libspf2 (PTS)jessie, jessie (lts)1.2.10-5+deb8u2vulnerable
stretch (security), stretch (lts), stretch1.2.10-7+deb9u2vulnerable
buster, buster (security)1.2.10-7.1~deb10u1vulnerable
bullseye (security), bullseye1.2.10-7.1~deb11u1vulnerable
bookworm1.2.10-7.2vulnerable
trixie1.2.10-8vulnerable
sid1.2.10-8.2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libspf2sourcejessie(unfixed)end-of-life
libspf2source(unstable)(unfixed)1053870

Notes

[bookworm] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)
[bullseye] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)
[buster] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)
https://www.zerodayinitiative.com/advisories/ZDI-23-1472/
https://bugs.exim.org/show_bug.cgi?id=3032
https://www.openwall.com/lists/oss-security/2023/09/29/5
https://www.openwall.com/lists/oss-security/2023/10/01/4
https://exim.org/static/doc/security/CVE-2023-zdi.txt
https://lists.exim.org/lurker/message/20231004.080103.8c98192c.en.html
Potentially same issue as: https://github.com/shevek/libspf2/issues/45
https://github.com/shevek/libspf2/pull/44
The potentially related (but unknown if exploitable) integer overflow flaw from pull/44
is fixed with libspf2/1.2.10-8. There have been 1. no proofs it is exploitable, and the
finder clarifies as "ut I haven't been able to get it to do anything after that because
another buffer fills up." and 2. that this is the same issue as CVE-2023-42118 .
[stretch] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)

Search for package or bug name: Reporting problems