search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Exim vulnerable to buffer overflow via the dns_build_reverse() routine

Vulnerability Note VU#132992

Original Release Date: 2005-01-27 | Last Revised: 2005-01-28

Overview

The Exim Mail Transfer Agent (MTA) contains a buffer overflow that allows a local attacker to execute arbitrary code.

Description

Exim MTA is an open-source mail transport agent distributed by the University of Cambridge. A lack of input validation on user supplied data may allow a buffer overflow to occur in Exim. If a local attacker supplies the Exim with a specially crafted command line options, that attacker may be able to cause a buffer overflow in the dns_build_reverse()routine.

According to public reports, this vulnerability exists in Exim versions prior to 4.44.

Impact

A local attacker may be able to execute arbitrary code with elevated (root) privileges.

Solution

Upgrade

This issue has been addressed in Exim version 4.4.

Vendor Information

132992
 

View all 13 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by iDEFENSE Inc.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2005-0021
Severity Metric: 2.76
Date Public: 2005-01-14
Date First Published: 2005-01-27
Date Last Updated: 2005-01-28 20:18 UTC
Document Revision: 69

Sponsored by CISA.