Summary
Detail | |||
---|---|---|---|
Vendor | University Of Cambridge | First view | 2001-09-20 |
Product | Exim | Last view | 2005-05-02 |
Version | 3.18 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:university_of_cambridge:exim |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
4.6 | 2005-05-02 | CVE-2005-0022 | Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication. |
7.2 | 2005-05-02 | CVE-2005-0021 | Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function. |
7.5 | 2004-07-07 | CVE-2004-0400 | Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check. |
7.5 | 2003-10-20 | CVE-2003-0743 | Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer. |
4.6 | 2002-05-31 | CVE-2002-0274 | Exim 3.34 and earlier may allow local users to gain privileges via a buffer overflow in long -C (configuration file) and other command line arguments. |
7.5 | 2001-12-19 | CVE-2001-0889 | Exim 3.22 and earlier, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote attackers to execute arbitrary commands via shell metacharacters. |
7.5 | 2001-09-20 | CVE-2001-0690 | Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers. |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
12946 | Exim -bh Command Line Option dns_build_reverse Function Local Overflow |
12727 | Exim SPA Authentication spa_base64_to_bits Function Remote Overflow |
12726 | Exim -be Command Line Option host_aton Function Local Overflow |
10877 | Exim smtp_in.c HELO/EHLO Remote Overflow |
5897 | Exim header_syntax Function Remote Overflow |
5530 | Exim Localhost Name Arbitrary Command Execution |
5330 | Exim Configuration File Variable Overflow |
1855 | Exim Batched SMTP Mail Header Format String |
OpenVAS Exploits
id | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200405-07 (Exim) File : nvt/glsa_200405_07.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200501-23 (exim) File : nvt/glsa_200501_23.nasl |
2008-09-04 | Name : exim -- two buffer overflow vulnerabilities File : nvt/freebsd_exim.nasl |
2008-09-04 | Name : FreeBSD Ports: exim, exim-ldap2, exim-mysql, exim-postgresql File : nvt/freebsd_exim0.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 058-1 (exim) File : nvt/deb_058_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 097-1 (exim) File : nvt/deb_097_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 376-1 (exim exim-tls) File : nvt/deb_376_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 501-1 (exim) File : nvt/deb_501_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 502-1 (exim-tls) File : nvt/deb_502_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 635-1 (exim) File : nvt/deb_635_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 637-1 (exim-tls) File : nvt/deb_637_1.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | AUTH user overflow attempt RuleID : 3824 - Type : SERVER-MAIL - Revision : 16 |
2015-07-08 | Exim buffer overflow attempt RuleID : 34645 - Type : SERVER-MAIL - Revision : 3 |
2014-01-10 | BCC command overflow attempt RuleID : 2596 - Type : SMTP - Revision : 4 |
2014-01-10 | CC command overflow attempt RuleID : 2595 - Type : SMTP - Revision : 4 |
2014-01-10 | To command overflow attempt RuleID : 2594 - Type : SMTP - Revision : 4 |
2014-01-10 | Sender command overflow attempt RuleID : 2593 - Type : SMTP - Revision : 4 |
2014-01-10 | ReplyTo command overflow attempt RuleID : 2592 - Type : SMTP - Revision : 4 |
2014-01-10 | From command overflow attempt RuleID : 2591 - Type : SMTP - Revision : 4 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2012-09-24 | Name: The remote Fedora Core host is missing a security update. File: fedora_2005-002.nasl - Type: ACT_GATHER_INFO |
2009-04-23 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_5f29c2e49f6a11d8abbc00e08110b673.nasl - Type: ACT_GATHER_INFO |
2006-01-15 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-56-1.nasl - Type: ACT_GATHER_INFO |
2005-07-13 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_ca9ce8795ebb11d9a01c0050569f0001.nasl - Type: ACT_GATHER_INFO |
2005-02-22 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2005-025.nasl - Type: ACT_GATHER_INFO |
2005-02-14 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-200501-23.nasl - Type: ACT_GATHER_INFO |
2005-01-13 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-637.nasl - Type: ACT_GATHER_INFO |
2005-01-12 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-635.nasl - Type: ACT_GATHER_INFO |
2005-01-07 | Name: The remote mail server is vulnerable to a buffer overflow attack. File: exim_spa_ipv6_overflow.nasl - Type: ACT_GATHER_INFO |
2005-01-07 | Name: The remote Fedora Core host is missing a security update. File: fedora_2005-001.nasl - Type: ACT_GATHER_INFO |
2004-09-29 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-058.nasl - Type: ACT_GATHER_INFO |
2004-09-29 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-502.nasl - Type: ACT_GATHER_INFO |
2004-09-29 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-501.nasl - Type: ACT_GATHER_INFO |
2004-09-29 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-376.nasl - Type: ACT_GATHER_INFO |
2004-08-30 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-200405-07.nasl - Type: ACT_GATHER_INFO |
2004-05-06 | Name: The remote SMTP server has multiple buffer overflow vulnerabilities. File: exim_mult_overflow.nasl - Type: ACT_MIXED_ATTACK |
2003-09-02 | Name: The remote SMTP server has a heap-based buffer overflow vulnerability. File: exim_heap_overflow.nasl - Type: ACT_GATHER_INFO |