[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2010-4344Date: (C)2010-12-14   (M)2023-12-22


Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 9.3
Exploit Score: 8.6
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1024858
http://www.securityfocus.com/archive/1/515172/100/0/threaded
SECUNIA-40019
SECUNIA-42576
SECUNIA-42586
SECUNIA-42587
SECUNIA-42589
BID-45308
OSVDB-69685
ADV-2010-3171
ADV-2010-3172
ADV-2010-3181
ADV-2010-3186
ADV-2010-3204
ADV-2010-3246
ADV-2010-3317
DSA-2131
RHSA-2010:0970
SUSE-SA:2010:059
USN-1032-1
VU#682457
http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html
http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html
http://openwall.com/lists/oss-security/2010/12/10/1
http://www.openwall.com/lists/oss-security/2021/05/04/7
ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.70
http://atmail.com/blog/2010/atmail-6204-now-available/
http://bugs.exim.org/show_bug.cgi?id=787
http://git.exim.org/exim.git/commit/24c929a27415c7cfc7126c47e4cad39acf3efa6b
http://www.cpanel.net/2010/12/exim-remote-memory-corruption-vulnerability-notification-cve-2010-4344.html
http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format
http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/
https://bugzilla.redhat.com/show_bug.cgi?id=661756

CWE    1
CWE-119
OVAL    6
oval:org.secpod.oval:def:200197
oval:org.secpod.oval:def:700184
oval:org.secpod.oval:def:600128
oval:org.secpod.oval:def:200203
...

© SecPod Technologies