Executive Summary
Summary | |
---|---|
Title | exim4 security update |
Informations | |||
---|---|---|---|
Name | DSA-4053 | First vendor Publication | 2017-11-30 |
Vendor | Debian | Last vendor Modification | 2017-11-30 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities have been discovered in Exim, a mail transport agent. The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2017-16943 A use-after-free vulnerability was discovered in Exim's routines responsible for parsing mail headers. A remote attacker can take advantage of this flaw to cause Exim to crash, resulting in a denial of service, or potentially for remote code execution. CVE-2017-16944 It was discovered that Exim does not properly handle BDAT data headers allowing a remote attacker to cause Exim to crash, resulting in a denial of service. For the stable distribution (stretch), these problems have been fixed in version 4.89-2+deb9u2. Default installations disable advertising the ESMTP CHUNKING extension and are not affected by these issues. We recommend that you upgrade your exim4 packages. For the detailed security status of exim4 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/exim4 |
Original Source
Url : http://www.debian.org/security/2017/dsa-4053 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-416 | Use After Free |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 | |
Os | 1 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-26 | Exim malformed BDAT code execution attempt RuleID : 51301 - Revision : 1 - Type : SERVER-OTHER |
2018-01-03 | Exim malformed BDAT code execution attempt RuleID : 45046 - Revision : 5 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-03-07 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201803-01.nasl - Type : ACT_GATHER_INFO |
2018-01-15 | Name : The remote Fedora host is missing a security update. File : fedora_2017-0053bb9719.nasl - Type : ACT_GATHER_INFO |
2017-12-26 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2017-932.nasl - Type : ACT_GATHER_INFO |
2017-12-14 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-1342.nasl - Type : ACT_GATHER_INFO |
2017-12-13 | Name : The remote Fedora host is missing a security update. File : fedora_2017-0032baa7d7.nasl - Type : ACT_GATHER_INFO |
2017-12-01 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4053.nasl - Type : ACT_GATHER_INFO |
2017-12-01 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_75dd622cd5fd11e7b9fec13eb7bcbf4f.nasl - Type : ACT_GATHER_INFO |
2017-11-30 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-3499-1.nasl - Type : ACT_GATHER_INFO |
2017-11-29 | Name : The remote mail server is potentially affected by a remote code execution flaw. File : exim_bdat_chunk_uaf.nasl - Type : ACT_GATHER_INFO |
2017-11-28 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-3493-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-12-08 00:23:52 |
|
2017-12-02 13:23:48 |
|
2017-11-30 09:20:47 |
|