CVE-2023-51765

Published: Dic 24, 2023 Last Modified: Nov 21, 2024
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,3
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: none

Description

AI Translation Available

sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports <LF>.<CR><LF> but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with 'o' in srv_features.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0084
Percentile
0,7th
Updated

EPSS Score Trend (Last 90 Days)

345

Insufficient Verification of Data Authenticity

Draft
Common Consequences
Security Scopes Affected:
Integrity Other
Potential Impacts:
Varies By Context Unexpected State
Applicable Platforms
Technologies: ICS/OT
View CWE Details
Operating System

Enterprise Linux by Redhat

cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Freebsd by Freebsd

Version Range Affected
To 11.0 (exclusive)
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Sendmail by Sendmail

Version Range Affected
To 8.18.0.2 (exclusive)
cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux by Redhat

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://access.redhat.com/security/cve/CVE-2023-51765
https://bugzilla.redhat.com/show_bug.cgi?id=2255869
Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2255869
https://bugzilla.suse.com/show_bug.cgi?id=1218351
Issue Tracking Patch Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1218351
https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html
https://github.com/freebsd/freebsd-src/commit/5dd76dd0cc19450133aa379ce0ce4a68a…
https://lists.debian.org/debian-lts-announce/2024/06/msg00004.html
https://lwn.net/Articles/956533/
https://sec-consult.com/blog/detail/smtp-smuggling-spoofing…
Technical Description Third Party Advisory
https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
https://www.openwall.com/lists/oss-security/2023/12/21/7
https://www.openwall.com/lists/oss-security/2023/12/22/7
https://www.youtube.com/watch?v=V8KPV96g1To
http://www.openwall.com/lists/oss-security/2023/12/24/1
http://www.openwall.com/lists/oss-security/2023/12/25/1
http://www.openwall.com/lists/oss-security/2023/12/26/5
http://www.openwall.com/lists/oss-security/2023/12/29/5
http://www.openwall.com/lists/oss-security/2023/12/30/1
http://www.openwall.com/lists/oss-security/2023/12/30/3
https://access.redhat.com/security/cve/CVE-2023-51765
https://bugzilla.redhat.com/show_bug.cgi?id=2255869
Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2255869
https://bugzilla.suse.com/show_bug.cgi?id=1218351
Issue Tracking Patch Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1218351
https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html
https://github.com/freebsd/freebsd-src/commit/5dd76dd0cc19450133aa379ce0ce4a68a…
https://lists.debian.org/debian-lts-announce/2024/06/msg00004.html
https://lwn.net/Articles/956533/
https://sec-consult.com/blog/detail/smtp-smuggling-spoofing…
Technical Description Third Party Advisory
https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
https://www.openwall.com/lists/oss-security/2023/12/21/7
https://www.openwall.com/lists/oss-security/2023/12/22/7
https://www.youtube.com/watch?v=V8KPV96g1To
http://www.openwall.com/lists/oss-security/2023/12/24/1
http://www.openwall.com/lists/oss-security/2023/12/25/1
http://www.openwall.com/lists/oss-security/2023/12/26/5
http://www.openwall.com/lists/oss-security/2023/12/29/5
http://www.openwall.com/lists/oss-security/2023/12/30/1
http://www.openwall.com/lists/oss-security/2023/12/30/3