DNS: libspf2 Macro Expansion Integer Underflow

This signature detects attempts to exploit a known vulnerability against libspf2. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the libspf2.

Extended Description

Exim libspf2 Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Exim libspf2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of SPF macros. When parsing SPF macros, the process does not properly validate user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17578.

References

CVE: CVE-2023-42118

Short Name
DNS:LIBSPF-MACRO-OVERFLOW
Severity
Major
Recommended
False
Recommended Action
Drop
Category
DNS
Keywords
CVE-2023-42118 Expansion Integer Macro Underflow libspf2
Release Date
04/04/2024
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3742
False Positive
Rarely

Found a potential security threat?