Lucene search

K
osvGoogleOSV:CVE-2023-51765
HistoryDec 24, 2023 - 6:15 a.m.

CVE-2023-51765

2023-12-2406:15:07
Google
osv.dev
11
sendmail
smtp smuggling
remote attackers
exploitation technique
e-mail servers
spf protection mechanism
8.18
software

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

6.8 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.7%

sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports <LF>.<CR><LF> but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with ‘o’ in srv_features.

CPENameOperatorVersion
freebsd-srceqrelease/8.1.0

References

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

6.8 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.7%