SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   Exim Vendors:   Exim.org
Exim Buffer Overfow in string_format() Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1024858
SecurityTracker URL:  http://securitytracker.com/id/1024858
CVE Reference:   CVE-2010-4344   (Links to External Site)
Updated:  Dec 10 2010
Original Entry Date:  Dec 10 2010
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 4.70
Description:   A vulnerability was reported in Exim. A remote user can execute arbitrary code on the target system.

A remote user can send an e-mail message with a specially crafted header value to trigger a buffer overflow in string_format() and execute arbitrary code on the target system. The code will run with the privileges of the target service.

Electric Fence reported this vulnerability.

This vulnerability is being actively exploited.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fix (4.70).

[Editor's note: The source code fix was issued in December 2008.]

Vendor URL:  www.exim.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Dec 10 2010 (Red Hat Issues Fix) Exim Buffer Overfow in string_format() Lets Remote Users Execute Arbitrary Code
Red Hat has issued a fix for Red Hat Enterprise Linux 4 and 5 and Red Hat Enterprise Linux 4.7, 5.3, and 5.4 Extended Update Support.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC