Lucene search

K
cveMitreCVE-2023-51765
HistoryDec 24, 2023 - 6:15 a.m.

CVE-2023-51765

2023-12-2406:15:07
CWE-345
mitre
web.nvd.nist.gov
73
20
cve-2023-51765
sendmail
smtp smuggling
remote attackers
spf bypass
nvd

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

5.4

Confidence

High

EPSS

0.002

Percentile

54.6%

sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports <LF>.<CR><LF> but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with ‘o’ in srv_features.

Affected configurations

Nvd
Node
sendmailsendmailRange<8.18.0.2
Node
freebsdfreebsdRange<11.0
Node
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0
VendorProductVersionCPE
sendmailsendmail*cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*
freebsdfreebsd*cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
redhatenterprise_linux8.0cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
redhatenterprise_linux9.0cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

References

Social References

More

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

5.4

Confidence

High

EPSS

0.002

Percentile

54.6%