
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability was discovered in Exim's Regex Handler component, identified as CVE-2022-3559. The vulnerability was found in October 2022 and affects the processing of regular expressions in Exim mail transfer agent. The issue was addressed with patch 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2 (Exim Bug, Exim Git).
The vulnerability manifests as a use-after-free condition in the Regex Handler component when processing regular expressions, particularly during SMTP connections handling multiple messages in the same session. The issue occurs specifically when regex variables are accessed after being freed during SMTP connection resets (Exim Bug).
When exploited, this vulnerability could lead to unexpected system behavior and potential crashes of the Exim mail server. The issue particularly affects scenarios where multiple messages are processed in the same SMTP connection, potentially disrupting mail service operations (Debian Security).
The issue was fixed in various Exim versions across different distributions. Fedora released updates 4.96-4.fc35, 4.96-4.fc36, and 4.96-5.fc37 to address this vulnerability. Debian also provided fixes in versions 4.94.2-7+deb11u4 for bullseye and 4.96-15+deb12u5 for bookworm (Fedora Update, Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."