This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor University Of Cambridge First view 2001-09-20
Product Exim Last view 2005-05-02
Version 3.18 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:university_of_cambridge:exim

Activity : Overall

Related : CVE

  Date Alert Description
4.6 2005-05-02 CVE-2005-0022

Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.

7.2 2005-05-02 CVE-2005-0021

Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.

7.5 2004-07-07 CVE-2004-0400

Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.

7.5 2003-10-20 CVE-2003-0743

Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer.

4.6 2002-05-31 CVE-2002-0274

Exim 3.34 and earlier may allow local users to gain privileges via a buffer overflow in long -C (configuration file) and other command line arguments.

7.5 2001-12-19 CVE-2001-0889

Exim 3.22 and earlier, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote attackers to execute arbitrary commands via shell metacharacters.

7.5 2001-09-20 CVE-2001-0690

Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.

Open Source Vulnerability Database (OSVDB)

id Description
12946 Exim -bh Command Line Option dns_build_reverse Function Local Overflow
12727 Exim SPA Authentication spa_base64_to_bits Function Remote Overflow
12726 Exim -be Command Line Option host_aton Function Local Overflow
10877 Exim smtp_in.c HELO/EHLO Remote Overflow
5897 Exim header_syntax Function Remote Overflow
5530 Exim Localhost Name Arbitrary Command Execution
5330 Exim Configuration File Variable Overflow
1855 Exim Batched SMTP Mail Header Format String

OpenVAS Exploits

id Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200405-07 (Exim)
File : nvt/glsa_200405_07.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200501-23 (exim)
File : nvt/glsa_200501_23.nasl
2008-09-04 Name : exim -- two buffer overflow vulnerabilities
File : nvt/freebsd_exim.nasl
2008-09-04 Name : FreeBSD Ports: exim, exim-ldap2, exim-mysql, exim-postgresql
File : nvt/freebsd_exim0.nasl
2008-01-17 Name : Debian Security Advisory DSA 058-1 (exim)
File : nvt/deb_058_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 097-1 (exim)
File : nvt/deb_097_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 376-1 (exim exim-tls)
File : nvt/deb_376_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 501-1 (exim)
File : nvt/deb_501_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 502-1 (exim-tls)
File : nvt/deb_502_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 635-1 (exim)
File : nvt/deb_635_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 637-1 (exim-tls)
File : nvt/deb_637_1.nasl

Snort® IPS/IDS

Date Description
2014-01-10 AUTH user overflow attempt
RuleID : 3824 - Type : SERVER-MAIL - Revision : 16
2015-07-08 Exim buffer overflow attempt
RuleID : 34645 - Type : SERVER-MAIL - Revision : 3
2014-01-10 BCC command overflow attempt
RuleID : 2596 - Type : SMTP - Revision : 4
2014-01-10 CC command overflow attempt
RuleID : 2595 - Type : SMTP - Revision : 4
2014-01-10 To command overflow attempt
RuleID : 2594 - Type : SMTP - Revision : 4
2014-01-10 Sender command overflow attempt
RuleID : 2593 - Type : SMTP - Revision : 4
2014-01-10 ReplyTo command overflow attempt
RuleID : 2592 - Type : SMTP - Revision : 4
2014-01-10 From command overflow attempt
RuleID : 2591 - Type : SMTP - Revision : 4

Nessus® Vulnerability Scanner

id Description
2012-09-24 Name: The remote Fedora Core host is missing a security update.
File: fedora_2005-002.nasl - Type: ACT_GATHER_INFO
2009-04-23 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_5f29c2e49f6a11d8abbc00e08110b673.nasl - Type: ACT_GATHER_INFO
2006-01-15 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-56-1.nasl - Type: ACT_GATHER_INFO
2005-07-13 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_ca9ce8795ebb11d9a01c0050569f0001.nasl - Type: ACT_GATHER_INFO
2005-02-22 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2005-025.nasl - Type: ACT_GATHER_INFO
2005-02-14 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-200501-23.nasl - Type: ACT_GATHER_INFO
2005-01-13 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-637.nasl - Type: ACT_GATHER_INFO
2005-01-12 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-635.nasl - Type: ACT_GATHER_INFO
2005-01-07 Name: The remote mail server is vulnerable to a buffer overflow attack.
File: exim_spa_ipv6_overflow.nasl - Type: ACT_GATHER_INFO
2005-01-07 Name: The remote Fedora Core host is missing a security update.
File: fedora_2005-001.nasl - Type: ACT_GATHER_INFO
2004-09-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-058.nasl - Type: ACT_GATHER_INFO
2004-09-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-502.nasl - Type: ACT_GATHER_INFO
2004-09-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-501.nasl - Type: ACT_GATHER_INFO
2004-09-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-376.nasl - Type: ACT_GATHER_INFO
2004-08-30 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-200405-07.nasl - Type: ACT_GATHER_INFO
2004-05-06 Name: The remote SMTP server has multiple buffer overflow vulnerabilities.
File: exim_mult_overflow.nasl - Type: ACT_MIXED_ATTACK
2003-09-02 Name: The remote SMTP server has a heap-based buffer overflow vulnerability.
File: exim_heap_overflow.nasl - Type: ACT_GATHER_INFO