Summary
Detail | |||
---|---|---|---|
Vendor | Exim | First view | 2010-06-07 |
Product | Exim | Last view | 2023-12-24 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.3 | 2023-12-24 | CVE-2023-51766 | Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports |
9.8 | 2022-10-20 | CVE-2022-3620 | A vulnerability was found in Exim and classified as problematic. This issue affects the function dmarc_dns_lookup of the file dmarc.c of the component DMARC Handler. The manipulation leads to use after free. The attack may be initiated remotely. The name of the patch is 12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211919. |
7.5 | 2022-10-17 | CVE-2022-3559 | A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability. |
9.8 | 2022-08-07 | CVE-2022-37452 | Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set. |
7.5 | 2022-08-06 | CVE-2022-37451 | Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc. |
7.5 | 2021-08-10 | CVE-2021-38371 | The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending. |
6.3 | 2021-05-06 | CVE-2021-27216 | Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options. |
9.8 | 2021-05-06 | CVE-2020-28026 | Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root. |
7.5 | 2021-05-06 | CVE-2020-28025 | Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory. |
9.8 | 2021-05-06 | CVE-2020-28024 | Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF. |
7.5 | 2021-05-06 | CVE-2020-28023 | Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client. |
9.8 | 2021-05-06 | CVE-2020-28022 | Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands. |
8.8 | 2021-05-06 | CVE-2020-28021 | Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command. |
9.8 | 2021-05-06 | CVE-2020-28020 | Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction. |
7.5 | 2021-05-06 | CVE-2020-28019 | Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA. |
9.8 | 2021-05-06 | CVE-2020-28018 | Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL. |
9.8 | 2021-05-06 | CVE-2020-28017 | Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption. |
7.8 | 2021-05-06 | CVE-2020-28016 | Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because "-F ''" is mishandled by parse_fix_phrase. |
7.8 | 2021-05-06 | CVE-2020-28015 | Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character. |
6.1 | 2021-05-06 | CVE-2020-28014 | Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten. |
7.8 | 2021-05-06 | CVE-2020-28013 | Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles "-F '.('" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy. |
7.8 | 2021-05-06 | CVE-2020-28012 | Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag. |
7.8 | 2021-05-06 | CVE-2020-28011 | Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root. |
7.8 | 2021-05-06 | CVE-2020-28010 | Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms). |
7.8 | 2021-05-06 | CVE-2020-28009 | Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days). |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
18% (8) | CWE-787 | Out-of-bounds Write |
11% (5) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
6% (3) | CWE-362 | Race Condition |
6% (3) | CWE-190 | Integer Overflow or Wraparound |
6% (3) | CWE-125 | Out-of-bounds Read |
6% (3) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
6% (3) | CWE-20 | Improper Input Validation |
4% (2) | CWE-416 | Use After Free |
4% (2) | CWE-269 | Improper Privilege Management |
4% (2) | CWE-264 | Permissions, Privileges, and Access Controls |
2% (1) | CWE-763 | Release of Invalid Pointer or Reference |
2% (1) | CWE-665 | Improper Initialization |
2% (1) | CWE-404 | Improper Resource Shutdown or Release |
2% (1) | CWE-345 | Insufficient Verification of Data Authenticity |
2% (1) | CWE-320 | Key Management Errors |
2% (1) | CWE-189 | Numeric Errors |
2% (1) | CWE-134 | Uncontrolled Format String |
2% (1) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
2% (1) | CWE-74 | Failure to Sanitize Data into a Different Plane ('Injection') |
2% (1) | CWE-19 | Data Handling |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:13736 | USN-1060-1 -- exim4 vulnerabilities |
oval:org.mitre.oval:def:22059 | RHSA-2010:0970: exim security update (Critical) |
oval:org.mitre.oval:def:13170 | USN-1032-1 -- exim4 vulnerability |
oval:org.mitre.oval:def:23061 | ELSA-2010:0970: exim security update (Critical) |
oval:org.mitre.oval:def:21735 | RHSA-2011:0153: exim security update (Moderate) |
oval:org.mitre.oval:def:12720 | DSA-2131-1 exim4 -- arbitrary code execution |
oval:org.mitre.oval:def:22839 | ELSA-2011:0153: exim security update (Moderate) |
oval:org.mitre.oval:def:12931 | DSA-2154-1 exim4 -- privilege escalation |
oval:org.mitre.oval:def:12692 | DSA-2154-2 exim4 -- privilege escalation / regression |
oval:org.mitre.oval:def:13499 | USN-1135-1 -- exim4 vulnerability |
oval:org.mitre.oval:def:12805 | DSA-2236-1 exim4 -- command injection |
oval:org.mitre.oval:def:14030 | USN-1130-1 -- exim4 vulnerability |
oval:org.mitre.oval:def:12038 | DSA-2232-1 exim4 -- format string vulnerability |
oval:org.mitre.oval:def:19926 | DSA-2566-1 exim4 - heap overflow |
oval:org.mitre.oval:def:17931 | USN-1618-1 -- exim4 vulnerability |
SAINT Exploits
Description | Link |
---|---|
Exim SMTP listener base64d function one-character buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
72642 | Exim DKIM Identity Lookup Item Remote Code Execution |
72156 | Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Form... |
70696 | Exim log.c open_log() Function Local Privilege Escalation |
69860 | Exim exim User Account Configuration File Directive Local Privilege Escalation |
69685 | Exim string_format Function Remote Overflow |
65159 | Exim transports/appendfile.c MBX Locking Race Condition Permission Modification |
65158 | Exim transports/appendfile.c Hardlink Handling Arbitrary File Overwrite |
ExploitDB Exploits
id | Description |
---|---|
16925 | Exim4 <= 4.69 string_format Function Heap Buffer Overflow |
OpenVAS Exploits
id | Description |
---|---|
2012-12-13 | Name : SuSE Update for exim openSUSE-SU-2012:1404-1 (exim) File : nvt/gb_suse_2012_1404_1.nasl |
2012-11-02 | Name : Fedora Update for exim FEDORA-2012-17085 File : nvt/gb_fedora_2012_17085_exim_fc16.nasl |
2012-11-02 | Name : Fedora Update for exim FEDORA-2012-17044 File : nvt/gb_fedora_2012_17044_exim_fc17.nasl |
2012-10-29 | Name : Ubuntu Update for exim4 USN-1618-1 File : nvt/gb_ubuntu_USN_1618_1.nasl |
2012-10-29 | Name : Debian Security Advisory DSA 2566-1 (exim4) File : nvt/deb_2566_1.nasl |
2012-10-29 | Name : FreeBSD Ports: exim File : nvt/freebsd_exim4.nasl |
2012-07-30 | Name : CentOS Update for exim CESA-2011:0153 centos5 x86_64 File : nvt/gb_CESA-2011_0153_exim_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for exim CESA-2010:0970 centos4 x86_64 File : nvt/gb_CESA-2010_0970_exim_centos4_x86_64.nasl |
2012-07-30 | Name : CentOS Update for exim CESA-2011:0153 centos4 x86_64 File : nvt/gb_CESA-2011_0153_exim_centos4_x86_64.nasl |
2011-08-09 | Name : CentOS Update for exim CESA-2011:0153 centos5 i386 File : nvt/gb_CESA-2011_0153_exim_centos5_i386.nasl |
2011-08-03 | Name : Debian Security Advisory DSA 2236-1 (exim4) File : nvt/deb_2236_1.nasl |
2011-08-03 | Name : Debian Security Advisory DSA 2232-1 (exim4) File : nvt/deb_2232_1.nasl |
2011-08-03 | Name : FreeBSD Ports: exim File : nvt/freebsd_exim3.nasl |
2011-06-03 | Name : Ubuntu Update for exim4 USN-1135-1 File : nvt/gb_ubuntu_USN_1135_1.nasl |
2011-05-23 | Name : Fedora Update for exim FEDORA-2011-7059 File : nvt/gb_fedora_2011_7059_exim_fc13.nasl |
2011-05-23 | Name : Fedora Update for exim FEDORA-2011-7047 File : nvt/gb_fedora_2011_7047_exim_fc14.nasl |
2011-05-17 | Name : Ubuntu Update for exim4 USN-1130-1 File : nvt/gb_ubuntu_USN_1130_1.nasl |
2011-04-19 | Name : Fedora Update for exim FEDORA-2010-12375 File : nvt/gb_fedora_2010_12375_exim_fc14.nasl |
2011-03-05 | Name : exim -- local privilege escalation File : nvt/freebsd_exim2.nasl |
2011-02-11 | Name : Ubuntu Update for exim4 vulnerabilities USN-1060-1 File : nvt/gb_ubuntu_USN_1060_1.nasl |
2011-01-31 | Name : CentOS Update for exim CESA-2011:0153 centos4 i386 File : nvt/gb_CESA-2011_0153_exim_centos4_i386.nasl |
2011-01-31 | Name : CentOS Update for exim CESA-2010:0970 centos4 i386 File : nvt/gb_CESA-2010_0970_exim_centos4_i386.nasl |
2011-01-24 | Name : FreeBSD Ports: exim File : nvt/freebsd_exim1.nasl |
2011-01-21 | Name : RedHat Update for exim RHSA-2011:0153-01 File : nvt/gb_RHSA-2011_0153-01_exim.nasl |
2011-01-04 | Name : SuSE Update for exim SUSE-SA:2010:059 File : nvt/gb_suse_2010_059.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2020-04-02 | Exim unauthenticated remote code execution attempt RuleID : 53378 - Type : SERVER-OTHER - Revision : 1 |
2020-04-02 | Exim unauthenticated remote code execution attempt RuleID : 53377 - Type : SERVER-OTHER - Revision : 1 |
2020-04-02 | Exim unauthenticated remote code execution attempt RuleID : 53376 - Type : SERVER-OTHER - Revision : 1 |
2019-09-26 | Exim malformed BDAT code execution attempt RuleID : 51301 - Type : SERVER-OTHER - Revision : 1 |
2019-07-09 | Exim remote command execution attempt RuleID : 50356 - Type : SERVER-MAIL - Revision : 1 |
2018-09-18 | EHLO user overflow attempt RuleID : 47541 - Type : SERVER-MAIL - Revision : 2 |
2018-06-12 | EHLO user overflow attempt RuleID : 46610 - Type : SERVER-MAIL - Revision : 3 |
2018-01-03 | Exim malformed BDAT code execution attempt RuleID : 45046 - Type : SERVER-OTHER - Revision : 5 |
2014-01-10 | AUTH user overflow attempt RuleID : 3824 - Type : SERVER-MAIL - Revision : 16 |
2014-01-10 | Exim DKIM decoding buffer overflow attempt RuleID : 25333 - Type : PROTOCOL-DNS - Revision : 7 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-03-09 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-970.nasl - Type: ACT_GATHER_INFO |
2018-03-07 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201803-01.nasl - Type: ACT_GATHER_INFO |
2018-03-06 | Name: The remote mail server is potentially affected by a buffer overflow vulnerabi... File: exim_4_90_1.nasl - Type: ACT_GATHER_INFO |
2018-02-27 | Name: The remote Fedora host is missing a security update. File: fedora_2018-5aec14e125.nasl - Type: ACT_GATHER_INFO |
2018-02-27 | Name: The remote Fedora host is missing a security update. File: fedora_2018-25a7ba3cb6.nasl - Type: ACT_GATHER_INFO |
2018-02-12 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_316b3c3e0e9811e88d4197657151f8c2.nasl - Type: ACT_GATHER_INFO |
2018-02-12 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4110.nasl - Type: ACT_GATHER_INFO |
2018-02-12 | Name: The remote Debian host is missing a security update. File: debian_DLA-1274.nasl - Type: ACT_GATHER_INFO |
2018-01-15 | Name: The remote Fedora host is missing a security update. File: fedora_2017-0053bb9719.nasl - Type: ACT_GATHER_INFO |
2017-12-26 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2017-932.nasl - Type: ACT_GATHER_INFO |
2017-12-14 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-1342.nasl - Type: ACT_GATHER_INFO |
2017-12-13 | Name: The remote Fedora host is missing a security update. File: fedora_2017-0032baa7d7.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_75dd622cd5fd11e7b9fec13eb7bcbf4f.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4053.nasl - Type: ACT_GATHER_INFO |
2017-11-30 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-3499-1.nasl - Type: ACT_GATHER_INFO |
2017-11-29 | Name: The remote mail server is potentially affected by a remote code execution flaw. File: exim_bdat_chunk_uaf.nasl - Type: ACT_GATHER_INFO |
2017-11-28 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-3493-1.nasl - Type: ACT_GATHER_INFO |
2017-10-23 | Name: The remote device is affected by multiple vulnerabilities. File: juniper_space_jsa_10826.nasl - Type: ACT_GATHER_INFO |
2017-09-25 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201709-19.nasl - Type: ACT_GATHER_INFO |
2017-09-01 | Name: The remote Fedora host is missing a security update. File: fedora_2017-f5177f3a16.nasl - Type: ACT_GATHER_INFO |
2017-08-30 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-980.nasl - Type: ACT_GATHER_INFO |
2017-06-30 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-714.nasl - Type: ACT_GATHER_INFO |
2017-06-26 | Name: The remote Debian host is missing a security update. File: debian_DLA-1001.nasl - Type: ACT_GATHER_INFO |
2017-06-22 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_8c1a271d56cf11e7b9fec13eb7bcbf4f.nasl - Type: ACT_GATHER_INFO |
2017-06-20 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-3322-1.nasl - Type: ACT_GATHER_INFO |