University Of Cambridge

Exim

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.82%
  • Veröffentlicht 02.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, ...

  • EPSS 1.45%
  • Veröffentlicht 02.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.

Exploit
  • EPSS 42.08%
  • Veröffentlicht 07.07.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.

Exploit
  • EPSS 6.39%
  • Veröffentlicht 07.07.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.

  • EPSS 7.02%
  • Veröffentlicht 20.10.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL c...

Exploit
  • EPSS 3.05%
  • Veröffentlicht 23.12.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.

  • EPSS 0.09%
  • Veröffentlicht 31.05.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Exim 3.34 and earlier may allow local users to gain privileges via a buffer overflow in long -C (configuration file) and other command line arguments.

  • EPSS 1.15%
  • Veröffentlicht 19.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Exim 3.22 and earlier, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote attackers to execute arbitrary commands via shell metacharacters.

Exploit
  • EPSS 20.24%
  • Veröffentlicht 20.09.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.

  • EPSS 0.15%
  • Veröffentlicht 22.07.1997 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in Exim allows local users to gain root privileges via a long :include: option in a .forward file.