Search for vulnerabilities
Vulnerability details: VCID-6p9m-9u9v-aaaa
Vulnerability ID VCID-6p9m-9u9v-aaaa
Aliases CVE-2017-16943
Summary The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual High http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16943.html
cvssv3 9.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16943.json
epss 0.12827 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.12827 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.12827 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.52704 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.52704 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.52704 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.52704 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.52704 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.52704 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.52704 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.52704 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.52704 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.52704 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.52704 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.52704 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.7201 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.7201 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.7201 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.7201 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.7201 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.75765 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.75765 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.75765 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.75765 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.75765 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.76408 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
epss 0.79665 https://api.first.org/data/v1/epss?cve=CVE-2017-16943
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=1517680
generic_textual High https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16943
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16944
generic_textual High https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2017-16943
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2017-16943
archlinux Critical https://security.archlinux.org/AVG-518
generic_textual High https://ubuntu.com/security/notices/USN-3493-1
Reference id Reference type URL
http://openwall.com/lists/oss-security/2017/11/25/1
http://openwall.com/lists/oss-security/2017/11/25/2
http://openwall.com/lists/oss-security/2017/11/25/3
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16943.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16943.json
https://api.first.org/data/v1/epss?cve=CVE-2017-16943
https://bugs.exim.org/show_bug.cgi?id=2199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16944
https://git.exim.org/exim.git/commit/4090d62a4b25782129cc1643596dc2f6e8f63bde
https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4
https://github.com/LetUsFsck/PoC-Exploit-Mirror/tree/master/CVE-2017-16944
https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html
https://ubuntu.com/security/notices/USN-3493-1
https://www.debian.org/security/2017/dsa-4053
http://www.openwall.com/lists/oss-security/2021/05/04/7
http://www.securitytracker.com/id/1039872
1517680 https://bugzilla.redhat.com/show_bug.cgi?id=1517680
882648 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882648
ASA-201711-32 https://security.archlinux.org/ASA-201711-32
AVG-518 https://security.archlinux.org/AVG-518
cpe:2.3:a:exim:exim:4.88:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.88:-:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.89:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.89:-:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2017-16943 https://nvd.nist.gov/vuln/detail/CVE-2017-16943
GLSA-201803-01 https://security.gentoo.org/glsa/201803-01
USN-3493-1 https://usn.ubuntu.com/3493-1/
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16943.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2017-16943
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2017-16943
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.95466
EPSS Score 0.12827
Published At Dec. 19, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.