CVE-2023-51765

NameCVE-2023-51765
Descriptionsendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports <LF>.<CR><LF> but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with 'o' in srv_features.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3829-1, ELA-1124-1
Debian Bugs1059386

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sendmail (PTS)jessie8.14.4-8+deb8u2vulnerable
stretch (lts), stretch8.15.2-8+deb9u2fixed
buster (security), buster, buster (lts)8.15.2-14~deb10u3fixed
bullseye8.15.2-22+deb11u3fixed
bookworm8.17.1.9-2+deb12u2fixed
sid, trixie8.18.1-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sendmailsourcejessie(unfixed)end-of-life
sendmailsourcestretch8.15.2-8+deb9u2ELA-1124-1
sendmailsourcebuster8.15.2-14~deb10u2DLA-3829-1
sendmailsourcebullseye8.15.2-22+deb11u1
sendmailsourcebookworm8.17.1.9-2+deb12u1
sendmailsource(unstable)8.18.1-11059386

Notes

https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
https://www.openwall.com/lists/oss-security/2023/12/21/6
https://www.openwall.com/lists/oss-security/2023/12/26/5

Search for package or bug name: Reporting problems