9.8

CVE-2010-4344

Warning
Media report
Exploit

Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.

Data is provided by the National Vulnerability Database (NVD)
EximExim Version < 4.70
OpensuseOpensuse Version11.1
OpensuseOpensuse Version11.2
OpensuseOpensuse Version11.3
DebianDebian Linux Version5.0
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04 SwEdition-
CanonicalUbuntu Linux Version9.10

25.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Exim Heap-Based Buffer Overflow Vulnerability

Vulnerability

Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 61.46% 0.983
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

http://secunia.com/advisories/40019
Vendor Advisory
Broken Link
http://openwall.com/lists/oss-security/2010/12/10/1
Third Party Advisory
Mailing List
http://secunia.com/advisories/42576
Vendor Advisory
Broken Link
http://secunia.com/advisories/42586
Vendor Advisory
Broken Link
http://secunia.com/advisories/42587
Vendor Advisory
Broken Link
http://secunia.com/advisories/42589
Vendor Advisory
Broken Link
http://www.debian.org/security/2010/dsa-2131
Third Party Advisory
Mailing List
http://www.kb.cert.org/vuls/id/682457
Third Party Advisory
US Government Resource
http://www.osvdb.org/69685
Patch
Exploit
Broken Link
http://www.securityfocus.com/archive/1/515172/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/bid/45308
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1024858
Third Party Advisory
Broken Link
VDB Entry