SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (E-mail Server)  >   Exim Vendors:   Exim.org
Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1012771
SecurityTracker URL:  http://securitytracker.com/id/1012771
CVE Reference:   CAN-2005-0021, CAN-2005-0022   (Links to External Site)
Updated:  Jan 10 2005
Original Entry Date:  Jan 5 2005
Impact:   Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.43 and prior versions
Description:   Two vulnerabilities were reported in Exim. A local user may be able to obtain elevated privileges.

Philip Hazel reported that there is a buffer overflow in the host_aton() function. A local user can supply an illegal IPv6 address with more than 8 components via the command line to trigger this flaw. It may be possible to execute arbitrary code with the privileges of the Exim process.

There is also a buffer overflow in the spa_base64_to_bits() function, used for SPA authentication. The impact was not specified.

Impact:   A local user may be able to execute arbitrary code with the privileges of the Exim process [but the report did not confirm this].
Solution:   The vendor has issued a fix in the latest snapshot:

ftp://ftp.csx.cam.ac.uk/pub/software/email/exim/Testing/exim-snapshot.tar.gz
ftp://ftp.csx.cam.ac.uk/pub/software/email/exim/Testing/exim-snapshot.tar.gz.sig

Also, patches for 4.43 are available at:

http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html

Vendor URL:  www.exim.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jan 12 2005 (Debian Issues Fix) Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
Debian has released a fix.
Jan 13 2005 (Debian Issues Fix for exim-tls) Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
Debian has released a fix for exim-tls.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2016, SecurityGlobal.net LLC