Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2011-1764 First vendor Publication 2011-10-04
Vendor Cve Last vendor Modification 2014-02-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1764

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-134 Uncontrolled Format String (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12038
 
Oval ID: oval:org.mitre.oval:def:12038
Title: DSA-2232-1 exim4 -- format string vulnerability
Description: It was discovered that Exim, the default mail transport agent in Debian, uses DKIM data obtain from DNS directly in a format string, potentially allowing malicious mail senders to execute arbitrary code. The oldstable distribution is not affected by this problem because it does not contain DKIM support.
Family: unix Class: patch
Reference(s): DSA-2232-1
CVE-2011-1764
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): exim4
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14030
 
Oval ID: oval:org.mitre.oval:def:14030
Title: USN-1130-1 -- exim4 vulnerability
Description: exim4: Exim mail transfer agent Exim could be made to run arbitrary code under some conditions.
Family: unix Class: patch
Reference(s): USN-1130-1
CVE-2011-1764
Version: 5
Platform(s): Ubuntu 10.10
Ubuntu 10.04
Product(s): exim4
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 72

OpenVAS Exploits

Date Description
2012-12-13 Name : SuSE Update for exim openSUSE-SU-2012:1404-1 (exim)
File : nvt/gb_suse_2012_1404_1.nasl
2011-08-03 Name : Debian Security Advisory DSA 2232-1 (exim4)
File : nvt/deb_2232_1.nasl
2011-08-03 Name : FreeBSD Ports: exim
File : nvt/freebsd_exim3.nasl
2011-05-23 Name : Fedora Update for exim FEDORA-2011-7047
File : nvt/gb_fedora_2011_7047_exim_fc14.nasl
2011-05-23 Name : Fedora Update for exim FEDORA-2011-7059
File : nvt/gb_fedora_2011_7059_exim_fc13.nasl
2011-05-17 Name : Ubuntu Update for exim4 USN-1130-1
File : nvt/gb_ubuntu_USN_1130_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
72156 Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Form...

Exim is prone to a format string condition. The dkim_exim_verify_finish() function fails to properly sanitize format string specifiers (e.g., %s and %x) in the DKIM-Signature header. With a specially crafted email, a remote attacker can potentially cause arbitrary code execution.

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-738.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_exim-110506.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_4_exim-110506.nasl - Type : ACT_GATHER_INFO
2014-01-28 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201401-32.nasl - Type : ACT_GATHER_INFO
2011-06-13 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1130-1.nasl - Type : ACT_GATHER_INFO
2011-05-19 Name : The remote Fedora host is missing a security update.
File : fedora_2011-7111.nasl - Type : ACT_GATHER_INFO
2011-05-18 Name : The remote Fedora host is missing a security update.
File : fedora_2011-7047.nasl - Type : ACT_GATHER_INFO
2011-05-18 Name : The remote Fedora host is missing a security update.
File : fedora_2011-7059.nasl - Type : ACT_GATHER_INFO
2011-05-16 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_36594c547be711e098380022156e8794.nasl - Type : ACT_GATHER_INFO
2011-05-10 Name : The remote mail server is potentially affected by a format string vulnerability.
File : exim_4_76.nasl - Type : ACT_ATTACK
2011-05-09 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2232.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624670
http://bugs.exim.org/show_bug.cgi?id=1106
http://git.exim.org/exim.git/commit/337e3505b0e6cd4309db6bf6062b33fa56e06cf8
https://bugzilla.redhat.com/show_bug.cgi?id=702474
DEBIAN http://www.debian.org/security/2011/dsa-2232
SECUNIA http://secunia.com/advisories/51155
SUSE http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2022-10-21 01:12:08
  • Multiple Updates
2021-05-04 12:14:25
  • Multiple Updates
2021-04-22 01:15:40
  • Multiple Updates
2020-05-23 01:44:24
  • Multiple Updates
2020-05-23 00:28:25
  • Multiple Updates
2016-04-26 20:43:59
  • Multiple Updates
2014-06-14 13:30:43
  • Multiple Updates
2014-02-21 13:21:45
  • Multiple Updates
2014-02-17 11:02:05
  • Multiple Updates
2013-05-10 22:59:41
  • Multiple Updates
2013-04-19 13:19:57
  • Multiple Updates