[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-4344

Date: (C)2010-12-14   (M)2015-12-16
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.

Reference:
SECTRACK-1024858
http://www.securityfocus.com/archive/1/archive/1/515172/100/0/threaded
SECUNIA-40019
SECUNIA-42576
SECUNIA-42586
SECUNIA-42587
SECUNIA-42589
BID-45308
OSVDB-69685
ADV-2010-3171
ADV-2010-3172
ADV-2010-3181
ADV-2010-3186
ADV-2010-3204
ADV-2010-3246
ADV-2010-3317
DSA-2131
RHSA-2010:0970
SUSE-SA:2010:059
USN-1032-1
VU#682457
http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html
http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html
http://openwall.com/lists/oss-security/2010/12/10/1
ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.70
http://atmail.com/blog/2010/atmail-6204-now-available/
http://bugs.exim.org/show_bug.cgi?id=787
http://git.exim.org/exim.git/commit/24c929a27415c7cfc7126c47e4cad39acf3efa6b
http://www.cpanel.net/2010/12/exim-remote-memory-corruption-vulnerability-notification-cve-2010-4344.html
http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format
http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/
https://bugzilla.redhat.com/show_bug.cgi?id=661756

CPE    64
cpe:/a:exim:exim:4.53
cpe:/a:exim:exim:4.54
cpe:/a:exim:exim:4.10
cpe:/a:exim:exim:4.51
...
CWE    1
CWE-119
OVAL    6
oval:org.secpod.oval:def:400028
oval:org.secpod.oval:def:200203
oval:org.secpod.oval:def:700184
oval:org.secpod.oval:def:200197
...

© 2013 SecPod Technologies