Exim

Exim

63 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 0.05%
  • Veröffentlicht 12.05.2026 00:00:00
  • Zuletzt bearbeitet 13.05.2026 15:52:25

Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byt...

Medienbericht
  • EPSS 0.11%
  • Veröffentlicht 30.04.2026 00:00:00
  • Zuletzt bearbeitet 01.05.2026 19:17:51

In Exim before 4.99.2, when the SPA authentication driver is used with an adversarial SPA resource, there can be an out-of-bounds write that crashes the connection instance, or erroneous data processing that divulges data from uninitialized heap memo...

Medienbericht
  • EPSS 0.07%
  • Veröffentlicht 30.04.2026 00:00:00
  • Zuletzt bearbeitet 01.05.2026 17:44:15

In Exim before 4.99.2, when utf8 operators are enabled, there is an out-of-bounds read if large UTF-8 trailing characters are present (malformed UTF-8 header data). Information might be divulged within an error message produced during handling of an ...

Medienbericht
  • EPSS 0.1%
  • Veröffentlicht 30.04.2026 00:00:00
  • Zuletzt bearbeitet 01.05.2026 17:51:06

In Exim before 4.99.2, when JSON lookup is enabled, an out-of-bounds heap write can occur when a JSON operator encounters malformed JSON in an untrusted header, because of an incorrect implementation of \ skipping.

Medienbericht
  • EPSS 0.1%
  • Veröffentlicht 30.04.2026 00:00:00
  • Zuletzt bearbeitet 01.05.2026 18:16:15

In Exim before 4.99.2, on systems using musl libc (not glibc), an attacker can crash the connection instance when malformed DNS data is present in PTR records. This is caused by a dn_expand oddity in octal printing.

  • EPSS 0.05%
  • Veröffentlicht 14.12.2025 04:00:24
  • Zuletzt bearbeitet 22.12.2025 19:15:45

Exim before 4.99.1, with certain non-default rate-limit configurations, allows a remote heap-based buffer overflow because database records are cast directly to internal structures without validation.

  • EPSS 0.1%
  • Veröffentlicht 27.03.2025 00:00:00
  • Zuletzt bearbeitet 30.09.2025 21:52:55

A use-after-free in Exim 4.96 through 4.98.1 could allow users (with command-line access) to escalate privileges.

  • EPSS 76.22%
  • Veröffentlicht 21.02.2025 13:15:11
  • Zuletzt bearbeitet 18.12.2025 19:16:22

Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection. (Resolving SQL injection requires an update to 4.99.1 in certain non-default rate-limit configurations.)

Exploit
  • EPSS 60.31%
  • Veröffentlicht 04.07.2024 15:15:10
  • Zuletzt bearbeitet 10.07.2025 22:15:25

Exim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users.

  • EPSS 0.73%
  • Veröffentlicht 03.05.2024 03:15:50
  • Zuletzt bearbeitet 03.11.2025 22:16:26

Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability...