Executive Summary

Summary
Title New exim-tls packages fix buffer overflows
Informations
Name DSA-502 First vendor Publication 2004-05-11
Vendor Debian Last vendor Modification 2004-05-11
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Georgi Guninski discovered two stack-based buffer overflows in exim and exim-tls. They can not be exploited with the default configuration from the Debian system, though. The Common Vulnerabilities and Exposures project identifies the following problems that are fixed with this update:

CAN-2004-0399

When "sender_verify = true" is configured in exim.conf a buffer overflow can happen during verification of the sender. This problem is fixed in exim 4.

CAN-2004-0400

When headers_check_syntax is configured in exim.conf a buffer overflow can happen during the header check. This problem does also exist in exim 4.

For the stable distribution (woody) these problems have been fixed in version 3.35-3woody2.

The unstable distribution (sid) does not contain exim-tls anymore. The functionality has been incorporated in the main exim versions which have these problems fixed in version 3.36-11 for exim 3 and in version 4.33-1 for exim 4.

We recommend that you upgrade your exim-tls package.

Original Source

Url : http://www.debian.org/security/2004/dsa-502

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 26

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200405-07 (Exim)
File : nvt/glsa_200405_07.nasl
2008-09-04 Name : FreeBSD Ports: exim, exim-ldap2, exim-mysql, exim-postgresql
File : nvt/freebsd_exim0.nasl
2008-01-17 Name : Debian Security Advisory DSA 501-1 (exim)
File : nvt/deb_501_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 502-1 (exim-tls)
File : nvt/deb_502_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
5897 Exim header_syntax Function Remote Overflow

A remote overflow exists in Exim. The issue is due to a boundary error within a routine for header syntax checking resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of confidentiality and integrity.
5896 Exim sender_verify Function Remote Overflow

A remote overflow exists in Exim. The issue is due to a boundary error within the verification of sender addresses resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of confidentiality and integrity.

Snort® IPS/IDS

Date Description
2015-07-08 Exim buffer overflow attempt
RuleID : 34645 - Revision : 3 - Type : SERVER-MAIL
2014-01-10 BCC command overflow attempt
RuleID : 2596 - Revision : 4 - Type : SMTP
2014-01-10 CC command overflow attempt
RuleID : 2595 - Revision : 4 - Type : SMTP
2014-01-10 To command overflow attempt
RuleID : 2594 - Revision : 4 - Type : SMTP
2014-01-10 Sender command overflow attempt
RuleID : 2593 - Revision : 4 - Type : SMTP
2014-01-10 ReplyTo command overflow attempt
RuleID : 2592 - Revision : 4 - Type : SMTP
2014-01-10 From command overflow attempt
RuleID : 2591 - Revision : 4 - Type : SMTP
2014-01-10 MAIL FROM overflow attempt
RuleID : 2590 - Revision : 6 - Type : SMTP
2014-01-10 MAIL FROM command overflow attempt
RuleID : 15574 - Revision : 9 - Type : SERVER-MAIL

Nessus® Vulnerability Scanner

Date Description
2009-04-23 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_5f29c2e49f6a11d8abbc00e08110b673.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-501.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-502.nasl - Type : ACT_GATHER_INFO
2004-08-30 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200405-07.nasl - Type : ACT_GATHER_INFO
2004-05-06 Name : The remote SMTP server has multiple buffer overflow vulnerabilities.
File : exim_mult_overflow.nasl - Type : ACT_MIXED_ATTACK

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:33:18
  • Multiple Updates