This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Exim First view 2010-06-07
Product Exim Last view 2023-12-24
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:* 44
cpe:2.3:a:exim:exim:-:*:*:*:*:*:*:* 44
cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:* 44
cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:* 43
cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:* 43

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.3 2023-12-24 CVE-2023-51766

Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports . but some other popular e-mail servers do not.

9.8 2022-10-20 CVE-2022-3620

A vulnerability was found in Exim and classified as problematic. This issue affects the function dmarc_dns_lookup of the file dmarc.c of the component DMARC Handler. The manipulation leads to use after free. The attack may be initiated remotely. The name of the patch is 12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211919.

7.5 2022-10-17 CVE-2022-3559

A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.

9.8 2022-08-07 CVE-2022-37452

Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.

7.5 2022-08-06 CVE-2022-37451

Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.

7.5 2021-08-10 CVE-2021-38371

The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.

6.3 2021-05-06 CVE-2021-27216

Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options.

9.8 2021-05-06 CVE-2020-28026

Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.

7.5 2021-05-06 CVE-2020-28025

Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory.

9.8 2021-05-06 CVE-2020-28024

Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.

7.5 2021-05-06 CVE-2020-28023

Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client.

9.8 2021-05-06 CVE-2020-28022

Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.

8.8 2021-05-06 CVE-2020-28021

Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.

9.8 2021-05-06 CVE-2020-28020

Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction.

7.5 2021-05-06 CVE-2020-28019

Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA.

9.8 2021-05-06 CVE-2020-28018

Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL.

9.8 2021-05-06 CVE-2020-28017

Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption.

7.8 2021-05-06 CVE-2020-28016

Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because "-F ''" is mishandled by parse_fix_phrase.

7.8 2021-05-06 CVE-2020-28015

Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character.

6.1 2021-05-06 CVE-2020-28014

Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten.

7.8 2021-05-06 CVE-2020-28013

Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles "-F '.('" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy.

7.8 2021-05-06 CVE-2020-28012

Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.

7.8 2021-05-06 CVE-2020-28011

Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.

7.8 2021-05-06 CVE-2020-28010

Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).

7.8 2021-05-06 CVE-2020-28009

Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days).

CWE : Common Weakness Enumeration

%idName
18% (8) CWE-787 Out-of-bounds Write
11% (5) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
6% (3) CWE-362 Race Condition
6% (3) CWE-190 Integer Overflow or Wraparound
6% (3) CWE-125 Out-of-bounds Read
6% (3) CWE-59 Improper Link Resolution Before File Access ('Link Following')
6% (3) CWE-20 Improper Input Validation
4% (2) CWE-416 Use After Free
4% (2) CWE-269 Improper Privilege Management
4% (2) CWE-264 Permissions, Privileges, and Access Controls
2% (1) CWE-763 Release of Invalid Pointer or Reference
2% (1) CWE-665 Improper Initialization
2% (1) CWE-404 Improper Resource Shutdown or Release
2% (1) CWE-345 Insufficient Verification of Data Authenticity
2% (1) CWE-320 Key Management Errors
2% (1) CWE-189 Numeric Errors
2% (1) CWE-134 Uncontrolled Format String
2% (1) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
2% (1) CWE-74 Failure to Sanitize Data into a Different Plane ('Injection')
2% (1) CWE-19 Data Handling

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:13736 USN-1060-1 -- exim4 vulnerabilities
oval:org.mitre.oval:def:22059 RHSA-2010:0970: exim security update (Critical)
oval:org.mitre.oval:def:13170 USN-1032-1 -- exim4 vulnerability
oval:org.mitre.oval:def:23061 ELSA-2010:0970: exim security update (Critical)
oval:org.mitre.oval:def:21735 RHSA-2011:0153: exim security update (Moderate)
oval:org.mitre.oval:def:12720 DSA-2131-1 exim4 -- arbitrary code execution
oval:org.mitre.oval:def:22839 ELSA-2011:0153: exim security update (Moderate)
oval:org.mitre.oval:def:12931 DSA-2154-1 exim4 -- privilege escalation
oval:org.mitre.oval:def:12692 DSA-2154-2 exim4 -- privilege escalation / regression
oval:org.mitre.oval:def:13499 USN-1135-1 -- exim4 vulnerability
oval:org.mitre.oval:def:12805 DSA-2236-1 exim4 -- command injection
oval:org.mitre.oval:def:14030 USN-1130-1 -- exim4 vulnerability
oval:org.mitre.oval:def:12038 DSA-2232-1 exim4 -- format string vulnerability
oval:org.mitre.oval:def:19926 DSA-2566-1 exim4 - heap overflow
oval:org.mitre.oval:def:17931 USN-1618-1 -- exim4 vulnerability

SAINT Exploits

Description Link
Exim SMTP listener base64d function one-character buffer overflow More info here

Open Source Vulnerability Database (OSVDB)

id Description
72642 Exim DKIM Identity Lookup Item Remote Code Execution
72156 Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Form...
70696 Exim log.c open_log() Function Local Privilege Escalation
69860 Exim exim User Account Configuration File Directive Local Privilege Escalation
69685 Exim string_format Function Remote Overflow
65159 Exim transports/appendfile.c MBX Locking Race Condition Permission Modification
65158 Exim transports/appendfile.c Hardlink Handling Arbitrary File Overwrite

ExploitDB Exploits

id Description
16925 Exim4 <= 4.69 string_format Function Heap Buffer Overflow

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-12-13 Name : SuSE Update for exim openSUSE-SU-2012:1404-1 (exim)
File : nvt/gb_suse_2012_1404_1.nasl
2012-11-02 Name : Fedora Update for exim FEDORA-2012-17085
File : nvt/gb_fedora_2012_17085_exim_fc16.nasl
2012-11-02 Name : Fedora Update for exim FEDORA-2012-17044
File : nvt/gb_fedora_2012_17044_exim_fc17.nasl
2012-10-29 Name : Ubuntu Update for exim4 USN-1618-1
File : nvt/gb_ubuntu_USN_1618_1.nasl
2012-10-29 Name : Debian Security Advisory DSA 2566-1 (exim4)
File : nvt/deb_2566_1.nasl
2012-10-29 Name : FreeBSD Ports: exim
File : nvt/freebsd_exim4.nasl
2012-07-30 Name : CentOS Update for exim CESA-2011:0153 centos5 x86_64
File : nvt/gb_CESA-2011_0153_exim_centos5_x86_64.nasl
2012-07-30 Name : CentOS Update for exim CESA-2010:0970 centos4 x86_64
File : nvt/gb_CESA-2010_0970_exim_centos4_x86_64.nasl
2012-07-30 Name : CentOS Update for exim CESA-2011:0153 centos4 x86_64
File : nvt/gb_CESA-2011_0153_exim_centos4_x86_64.nasl
2011-08-09 Name : CentOS Update for exim CESA-2011:0153 centos5 i386
File : nvt/gb_CESA-2011_0153_exim_centos5_i386.nasl
2011-08-03 Name : Debian Security Advisory DSA 2236-1 (exim4)
File : nvt/deb_2236_1.nasl
2011-08-03 Name : Debian Security Advisory DSA 2232-1 (exim4)
File : nvt/deb_2232_1.nasl
2011-08-03 Name : FreeBSD Ports: exim
File : nvt/freebsd_exim3.nasl
2011-06-03 Name : Ubuntu Update for exim4 USN-1135-1
File : nvt/gb_ubuntu_USN_1135_1.nasl
2011-05-23 Name : Fedora Update for exim FEDORA-2011-7059
File : nvt/gb_fedora_2011_7059_exim_fc13.nasl
2011-05-23 Name : Fedora Update for exim FEDORA-2011-7047
File : nvt/gb_fedora_2011_7047_exim_fc14.nasl
2011-05-17 Name : Ubuntu Update for exim4 USN-1130-1
File : nvt/gb_ubuntu_USN_1130_1.nasl
2011-04-19 Name : Fedora Update for exim FEDORA-2010-12375
File : nvt/gb_fedora_2010_12375_exim_fc14.nasl
2011-03-05 Name : exim -- local privilege escalation
File : nvt/freebsd_exim2.nasl
2011-02-11 Name : Ubuntu Update for exim4 vulnerabilities USN-1060-1
File : nvt/gb_ubuntu_USN_1060_1.nasl
2011-01-31 Name : CentOS Update for exim CESA-2011:0153 centos4 i386
File : nvt/gb_CESA-2011_0153_exim_centos4_i386.nasl
2011-01-31 Name : CentOS Update for exim CESA-2010:0970 centos4 i386
File : nvt/gb_CESA-2010_0970_exim_centos4_i386.nasl
2011-01-24 Name : FreeBSD Ports: exim
File : nvt/freebsd_exim1.nasl
2011-01-21 Name : RedHat Update for exim RHSA-2011:0153-01
File : nvt/gb_RHSA-2011_0153-01_exim.nasl
2011-01-04 Name : SuSE Update for exim SUSE-SA:2010:059
File : nvt/gb_suse_2010_059.nasl

Snort® IPS/IDS

Date Description
2020-04-02 Exim unauthenticated remote code execution attempt
RuleID : 53378 - Type : SERVER-OTHER - Revision : 1
2020-04-02 Exim unauthenticated remote code execution attempt
RuleID : 53377 - Type : SERVER-OTHER - Revision : 1
2020-04-02 Exim unauthenticated remote code execution attempt
RuleID : 53376 - Type : SERVER-OTHER - Revision : 1
2019-09-26 Exim malformed BDAT code execution attempt
RuleID : 51301 - Type : SERVER-OTHER - Revision : 1
2019-07-09 Exim remote command execution attempt
RuleID : 50356 - Type : SERVER-MAIL - Revision : 1
2018-09-18 EHLO user overflow attempt
RuleID : 47541 - Type : SERVER-MAIL - Revision : 2
2018-06-12 EHLO user overflow attempt
RuleID : 46610 - Type : SERVER-MAIL - Revision : 3
2018-01-03 Exim malformed BDAT code execution attempt
RuleID : 45046 - Type : SERVER-OTHER - Revision : 5
2014-01-10 AUTH user overflow attempt
RuleID : 3824 - Type : SERVER-MAIL - Revision : 16
2014-01-10 Exim DKIM decoding buffer overflow attempt
RuleID : 25333 - Type : PROTOCOL-DNS - Revision : 7

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-03-09 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-970.nasl - Type: ACT_GATHER_INFO
2018-03-07 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201803-01.nasl - Type: ACT_GATHER_INFO
2018-03-06 Name: The remote mail server is potentially affected by a buffer overflow vulnerabi...
File: exim_4_90_1.nasl - Type: ACT_GATHER_INFO
2018-02-27 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5aec14e125.nasl - Type: ACT_GATHER_INFO
2018-02-27 Name: The remote Fedora host is missing a security update.
File: fedora_2018-25a7ba3cb6.nasl - Type: ACT_GATHER_INFO
2018-02-12 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_316b3c3e0e9811e88d4197657151f8c2.nasl - Type: ACT_GATHER_INFO
2018-02-12 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4110.nasl - Type: ACT_GATHER_INFO
2018-02-12 Name: The remote Debian host is missing a security update.
File: debian_DLA-1274.nasl - Type: ACT_GATHER_INFO
2018-01-15 Name: The remote Fedora host is missing a security update.
File: fedora_2017-0053bb9719.nasl - Type: ACT_GATHER_INFO
2017-12-26 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2017-932.nasl - Type: ACT_GATHER_INFO
2017-12-14 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-1342.nasl - Type: ACT_GATHER_INFO
2017-12-13 Name: The remote Fedora host is missing a security update.
File: fedora_2017-0032baa7d7.nasl - Type: ACT_GATHER_INFO
2017-12-01 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_75dd622cd5fd11e7b9fec13eb7bcbf4f.nasl - Type: ACT_GATHER_INFO
2017-12-01 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4053.nasl - Type: ACT_GATHER_INFO
2017-11-30 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-3499-1.nasl - Type: ACT_GATHER_INFO
2017-11-29 Name: The remote mail server is potentially affected by a remote code execution flaw.
File: exim_bdat_chunk_uaf.nasl - Type: ACT_GATHER_INFO
2017-11-28 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-3493-1.nasl - Type: ACT_GATHER_INFO
2017-10-23 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa_10826.nasl - Type: ACT_GATHER_INFO
2017-09-25 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201709-19.nasl - Type: ACT_GATHER_INFO
2017-09-01 Name: The remote Fedora host is missing a security update.
File: fedora_2017-f5177f3a16.nasl - Type: ACT_GATHER_INFO
2017-08-30 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-980.nasl - Type: ACT_GATHER_INFO
2017-06-30 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-714.nasl - Type: ACT_GATHER_INFO
2017-06-26 Name: The remote Debian host is missing a security update.
File: debian_DLA-1001.nasl - Type: ACT_GATHER_INFO
2017-06-22 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_8c1a271d56cf11e7b9fec13eb7bcbf4f.nasl - Type: ACT_GATHER_INFO
2017-06-20 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-3322-1.nasl - Type: ACT_GATHER_INFO