Exim

Exim

57 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung Exploit
  • EPSS 93.93%
  • Veröffentlicht 05.06.2019 14:29:11
  • Zuletzt bearbeitet 06.11.2025 14:49:48

A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.

Warnung Exploit
  • EPSS 86.44%
  • Veröffentlicht 08.02.2018 23:29:01
  • Zuletzt bearbeitet 07.11.2025 19:04:28

An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.

Exploit
  • EPSS 74.99%
  • Veröffentlicht 25.11.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character sig...

Exploit
  • EPSS 76.66%
  • Veröffentlicht 25.11.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.

  • EPSS 0.29%
  • Veröffentlicht 19.06.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note...

  • EPSS 1.68%
  • Veröffentlicht 01.02.2017 15:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.

Exploit
  • EPSS 52.95%
  • Veröffentlicht 07.04.2016 23:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.

  • EPSS 0.21%
  • Veröffentlicht 04.09.2014 17:55:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

expand.c in Exim before 4.83 expands mathematical comparisons twice, which allows local users to gain privileges and execute arbitrary commands via a crafted lookup value.

  • EPSS 2.18%
  • Veröffentlicht 04.09.2014 17:55:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function.

  • EPSS 35.73%
  • Veröffentlicht 31.10.2012 16:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers t...