Improper Enforcement of Message Integrity During Transmission in a Communication Channel Affecting sendmail package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
1.09% (77th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-SENDMAIL-6139275
  • published25 Dec 2023
  • disclosed24 Dec 2023
  • creditSEC Consult

Introduced: 24 Dec 2023

CVE-2023-51765  (opens in a new tab)
CWE-924  (opens in a new tab)

How to fix?

There is no fixed version for sendmail.

Overview

Affected versions of this package are vulnerable to Improper Enforcement of Message Integrity During Transmission in a Communication Channel due to improper handling of SMTP protocol sequences, which allows header smuggling. An attacker can inject e-mail messages that appear to originate from the server, thus bypassing SPF protection mechanisms by exploiting the support for <LF>.<CR><LF> sequences, which are not universally handled by other e-mail servers.

CVSS Base Scores

version 3.1