Executive Summary

Name CVE-2014-2957 First vendor Publication 2014-09-04
Vendor Cve Last vendor Modification 2014-09-05

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2957

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

Application 76

Nessus® Vulnerability Scanner

Date Description
2014-08-12 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-482.nasl - Type : ACT_GATHER_INFO
2014-05-29 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_f99a4686e69411e39032000c2980a9f3.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0
MLIST https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html

Alert History

If you want to see full details history, please login or register.
Date Informations
2020-05-23 01:51:49
  • Multiple Updates
2020-05-23 00:40:43
  • Multiple Updates
2016-04-27 00:39:15
  • Multiple Updates
2014-09-05 21:24:01
  • Multiple Updates
2014-09-04 21:23:42
  • First insertion