Executive Summary
Summary | |
---|---|
Title | New exim packages fix buffer overflows |
Informations | |||
---|---|---|---|
Name | DSA-501 | First vendor Publication | 2004-05-07 |
Vendor | Debian | Last vendor Modification | 2004-05-07 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Georgi Guninski discovered two stack-based buffer overflows. They can not be exploited with the default configuration from the Debian system, though. The Common Vulnerabilities and Exposures project identifies the following problems that are fixed with this update: CAN-2004-0399 When "sender_verify = true" is configured in exim.conf a buffer overflow can happen during verification of the sender. This problem is fixed in exim 4. CAN-2004-0400 When headers_check_syntax is configured in exim.conf a buffer overflow can happen during the header check. This problem does also exist in exim 4. For the stable distribution (woody) these problems have been fixed in version 3.35-1woody3. For the unstable distribution (sid) these problems have been fixed in version 3.36-11 for exim 3 and in version 4.33-1 for exim 4. We recommend that you upgrade your exim package. |
Original Source
Url : http://www.debian.org/security/2004/dsa-501 |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200405-07 (Exim) File : nvt/glsa_200405_07.nasl |
2008-09-04 | Name : FreeBSD Ports: exim, exim-ldap2, exim-mysql, exim-postgresql File : nvt/freebsd_exim0.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 501-1 (exim) File : nvt/deb_501_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 502-1 (exim-tls) File : nvt/deb_502_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
5897 | Exim header_syntax Function Remote Overflow A remote overflow exists in Exim. The issue is due to a boundary error within a routine for header syntax checking resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of confidentiality and integrity. |
5896 | Exim sender_verify Function Remote Overflow A remote overflow exists in Exim. The issue is due to a boundary error within the verification of sender addresses resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of confidentiality and integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2015-07-08 | Exim buffer overflow attempt RuleID : 34645 - Revision : 3 - Type : SERVER-MAIL |
2014-01-10 | BCC command overflow attempt RuleID : 2596 - Revision : 4 - Type : SMTP |
2014-01-10 | CC command overflow attempt RuleID : 2595 - Revision : 4 - Type : SMTP |
2014-01-10 | To command overflow attempt RuleID : 2594 - Revision : 4 - Type : SMTP |
2014-01-10 | Sender command overflow attempt RuleID : 2593 - Revision : 4 - Type : SMTP |
2014-01-10 | ReplyTo command overflow attempt RuleID : 2592 - Revision : 4 - Type : SMTP |
2014-01-10 | From command overflow attempt RuleID : 2591 - Revision : 4 - Type : SMTP |
2014-01-10 | MAIL FROM overflow attempt RuleID : 2590 - Revision : 6 - Type : SMTP |
2014-01-10 | MAIL FROM command overflow attempt RuleID : 15574 - Revision : 9 - Type : SERVER-MAIL |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-04-23 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_5f29c2e49f6a11d8abbc00e08110b673.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-501.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-502.nasl - Type : ACT_GATHER_INFO |
2004-08-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200405-07.nasl - Type : ACT_GATHER_INFO |
2004-05-06 | Name : The remote SMTP server has multiple buffer overflow vulnerabilities. File : exim_mult_overflow.nasl - Type : ACT_MIXED_ATTACK |
Alert History
Date | Informations |
---|---|
2014-02-17 11:33:17 |
|