Korean
<< Back
VID 18109
Severity 40
Port 25
Protocol TCP
Class SMTP
Detailed Description The Exim SMTP server, according to its version number, is vulnerable to multiple buffer overflows.
Exim, developed by the University of Cambridge, is an open-source Mail Transfer Agent for various Unix platforms. Exim versions prior 4.70 are vulnerable to string_format Function Remote Overflow.
By sending a specially crafted message to the server, a remote attacker can leverage this vulnerability to execute arbitrary code on the server with the privilege of the exim server.

* Note: This check solely relied on the banner of the remote SMTP server to assess this vulnerability, so this might be a false positive.

* References:
http://bugs.exim.org/show_bug.cgi?id=787
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606612
http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html

* Platforms Affected:
Cambridge University, Exim versions prior to 4.70
Unix Any version
Linux Any version
Recommendation Upgrade to the latest exim package (4.70 or later), available from the Exim Internet Mailer Web site at http://www.exim.org/
Related URL CVE-2010-4344 (CVE)
Related URL 45308 (SecurityFocus)
Related URL (ISS)