Lucene search

K
redhatcveRedhat.comRH:CVE-2023-51765
HistoryDec 25, 2023 - 10:30 p.m.

CVE-2023-51765

2023-12-2522:30:23
redhat.com
access.redhat.com
46
sendmail
smtp
server
remote attacker
spoofed emails
spf checks
red hat
mitigation

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

6.6

Confidence

Low

EPSS

0.002

Percentile

54.6%

A flaw was found in some SMTP server configurations in Sendmail. This issue may allow a remote attacker to break out of the email message data to “smuggle” SMTP commands and send spoofed emails that pass SPF checks.

Mitigation

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

6.6

Confidence

Low

EPSS

0.002

Percentile

54.6%