CVE-2022-37451 Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.

CVE-2022-37451 Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.

This problem is fixed in 4.96.

Exim before 4.96 has a memory leak in smtp_parse_response because it does not set $smtp_data correctly.

In Exim before 4.96 pam_converse() in auths/call_pam.c calls pam_send_password() with a NULL password. This breaks GnuPG signing and causes the server to reject all connections.

This problem is fixed in Exim 4.97.

Exim before 4.96 does not check the return value of pam_send_password() to see if it was successful (was it rejected by the user's pam? was there an error? etc). This can cause Exim to send emails with encrypted data to a user who has disabled SMTP on their mail server.

This problem is fixed in Exim 4.97.

In Exim before 4.96, the function get_message() in util.c does not check if the $sender_address is a valid address. As a result, if a user sends email from an IP address which is not reachable by the server, get_message() will try to send email back to the sender.

This problem is fixed in Exim 4.97.

Exim before 4.96 does not set the message type when sending email via a relay server. This can result in emails

How to install Exim?

Exim is usually installed on Linux, BSD, and Solaris operating systems. To install it on Debian-based systems:
apt-get install exim4

How To Fix This Problem? Exim-4.96.tar.gz

References

Subscribe to CVE.news
Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
jamie@example.com
Subscribe