9.8

CVE-2010-4344

Warnung
Medienbericht
Exploit

Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
EximExim Version < 4.70
OpensuseOpensuse Version11.1
OpensuseOpensuse Version11.2
OpensuseOpensuse Version11.3
DebianDebian Linux Version5.0
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04 SwEdition-
CanonicalUbuntu Linux Version9.10

25.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Exim Heap-Based Buffer Overflow Vulnerability

Schwachstelle

Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 61.46% 0.983
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

http://secunia.com/advisories/40019
Vendor Advisory
Broken Link
http://openwall.com/lists/oss-security/2010/12/10/1
Third Party Advisory
Mailing List
http://secunia.com/advisories/42576
Vendor Advisory
Broken Link
http://secunia.com/advisories/42586
Vendor Advisory
Broken Link
http://secunia.com/advisories/42587
Vendor Advisory
Broken Link
http://secunia.com/advisories/42589
Vendor Advisory
Broken Link
http://www.debian.org/security/2010/dsa-2131
Third Party Advisory
Mailing List
http://www.kb.cert.org/vuls/id/682457
Third Party Advisory
US Government Resource
http://www.osvdb.org/69685
Patch
Exploit
Broken Link
http://www.securityfocus.com/archive/1/515172/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/bid/45308
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1024858
Third Party Advisory
Broken Link
VDB Entry