CVE-2022-3620
Publication date 20 October 2022
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A vulnerability was found in Exim and classified as problematic. This issue affects the function dmarc_dns_lookup of the file dmarc.c of the component DMARC Handler. The manipulation leads to use after free. The attack may be initiated remotely. The name of the patch is 12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211919.
Status
Package | Ubuntu Release | Status |
---|---|---|
exim4 | ||
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Notes
rodrigo-zaiden
vulnerable code was added in version 4.95-RC0, with commit 92583637b25b6bde926f9ca6be7b085e5ac8b1e6, so it doesn't affect releases prior to Jammy. DMARC support (EXPERIMENTAL_DMARC or SUPPORT_DMARC flags) is not built by default in Debian, so this issue is negligible in Ubuntu.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 · Critical |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |