<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Exim on Arzedlab 🪵</title><link>https://arzedlab.github.io/tags/exim/</link><description>Recent content in Exim on Arzedlab 🪵</description><generator>Hugo</generator><language>en-us</language><copyright>© Ravshan</copyright><lastBuildDate>Mon, 26 May 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://arzedlab.github.io/tags/exim/index.xml" rel="self" type="application/rss+xml"/><item><title>EXIM: CVE-2020-28025: Heap out-of-bounds read in pdkim_finish_bodyhash()</title><link>https://arzedlab.github.io/posts/exim-analysis-4-92-1-r-1fc3648c0bf4804d9828e1aa08614f70/</link><pubDate>Mon, 26 May 2025 00:00:00 +0000</pubDate><guid>https://arzedlab.github.io/posts/exim-analysis-4-92-1-r-1fc3648c0bf4804d9828e1aa08614f70/</guid><description>&lt;h1 id="exim-analysis-4921-r">EXIM: Analysis 4.92.1-R&lt;/h1>
&lt;p>This is just as re-analysis to better understand, the reporter and author of there vulnerabileties is company Qualys official link: &lt;a href="https://www.qualys.com/2021/05/04/21nails/21nails.txt">https://www.qualys.com/2021/05/04/21nails/21nails.txt&lt;/a>&lt;/p>
&lt;h2 id="cve-2020-28025-heap-out-of-bounds-read-in-pdkim_finish_bodyhash">CVE-2020-28025: Heap out-of-bounds read in pdkim_finish_bodyhash()&lt;/h2>
&lt;ol>
&lt;li>Callers of &lt;code>pdkim_finish_bodyhash()&lt;/code>&lt;/li>
&lt;/ol>
&lt;p>&lt;code>main()&lt;/code> → &lt;code>receive_msg()&lt;/code> → &lt;code>dkim_exim_verify_finish()&lt;/code>&lt;/p>
&lt;p>&lt;code>dkim_exim_verify_finish()&lt;/code> be called to verify DKIM (DomainKeys Identified Mail)
signature, then calls &lt;code>pdkim_feed_finish()&lt;/code> &lt;strong>, which calls&lt;/strong> &lt;code>pdkim_finish_bodyhash()&lt;/code>&lt;/p>
&lt;ol>
&lt;li>DKIM (DomainKeys Identified Mail) looks like this.&lt;/li>
&lt;/ol>
&lt;p>&lt;img src="image.png" alt="image.png">&lt;/p>
&lt;p>Code of the function &lt;code>pdkim_finish_bodyhash()&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#282a36;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-bash" data-lang="bash">&lt;span style="display:flex;">&lt;span>...
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> /* VERIFICATION --------------------------------------------------------- */
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> /* Be careful that the header sig included a bodyash */
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#ff79c6">if&lt;/span> &lt;span style="color:#ff79c6">(&lt;/span> sig-&amp;gt;bodyhash.data
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#ff79c6">&amp;amp;&amp;amp;&lt;/span> memcmp&lt;span style="color:#ff79c6">(&lt;/span>b-&amp;gt;bh.data, sig-&amp;gt;bodyhash.data, b-&amp;gt;bh.len&lt;span style="color:#ff79c6">)&lt;/span> &lt;span style="color:#ff79c6">==&lt;/span> 0&lt;span style="color:#ff79c6">)&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#ff79c6">{&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> DEBUG&lt;span style="color:#ff79c6">(&lt;/span>D_acl&lt;span style="color:#ff79c6">)&lt;/span> debug_printf&lt;span style="color:#ff79c6">(&lt;/span>&lt;span style="color:#f1fa8c">&amp;#34;PDKIM [%s] Body hash compared OK\n&amp;#34;&lt;/span>, sig-&amp;gt;domain&lt;span style="color:#ff79c6">)&lt;/span>;
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#ff79c6">}&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#ff79c6">else&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#ff79c6">{&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> DEBUG&lt;span style="color:#ff79c6">(&lt;/span>D_acl&lt;span style="color:#ff79c6">)&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#ff79c6">{&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>	debug_printf&lt;span style="color:#ff79c6">(&lt;/span>&lt;span style="color:#f1fa8c">&amp;#34;PDKIM [%s] Body hash signature from headers: &amp;#34;&lt;/span>, sig-&amp;gt;domain&lt;span style="color:#ff79c6">)&lt;/span>;
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>	pdkim_hexprint&lt;span style="color:#ff79c6">(&lt;/span>sig-&amp;gt;bodyhash.data, sig-&amp;gt;bodyhash.len&lt;span style="color:#ff79c6">)&lt;/span>;
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>	debug_printf&lt;span style="color:#ff79c6">(&lt;/span>&lt;span style="color:#f1fa8c">&amp;#34;PDKIM [%s] Body hash did NOT verify\n&amp;#34;&lt;/span>, sig-&amp;gt;domain&lt;span style="color:#ff79c6">)&lt;/span>;
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>	&lt;span style="color:#ff79c6">}&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> sig-&amp;gt;verify_status &lt;span style="color:#ff79c6">=&lt;/span> PDKIM_VERIFY_FAIL;
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> sig-&amp;gt;verify_ext_status &lt;span style="color:#ff79c6">=&lt;/span> PDKIM_VERIFY_FAIL_BODY;
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#ff79c6">}&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>...
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Unfortunately, at line 826, &lt;code>sig-&amp;gt;bodyhash.data&lt;/code> is attacker-controlled (through a &amp;ldquo;DKIM-Signature:&amp;rdquo; mail header) and &lt;code>memcmp()&lt;/code> is called without checking first that &lt;code>sig-&amp;gt;bodyhash.len&lt;/code> is equal to &lt;code>b-&amp;gt;bh.len&lt;/code>: &lt;code>memcmp()&lt;/code> can read &lt;code>sig-&amp;gt;bodyhash.data&lt;/code> out-of-bounds. If the &lt;code>acl_smtp_dkim&lt;/code> is set (it is unset by default), an unauthenticated remote attacker may transform this vulnerability into an information disclosure; we have not fully explored this possibility.&lt;/p></description></item></channel></rss>