VID |
18109 |
Severity |
40 |
Port |
25 |
Protocol |
TCP |
Class |
SMTP |
Detailed Description |
The Exim SMTP server, according to its version number, is vulnerable to multiple buffer overflows. Exim, developed by the University of Cambridge, is an open-source Mail Transfer Agent for various Unix platforms. Exim versions prior 4.70 are vulnerable to string_format Function Remote Overflow. By sending a specially crafted message to the server, a remote attacker can leverage this vulnerability to execute arbitrary code on the server with the privilege of the exim server.
* Note: This check solely relied on the banner of the remote SMTP server to assess this vulnerability, so this might be a false positive.
* References: http://bugs.exim.org/show_bug.cgi?id=787 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606612 http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html
* Platforms Affected: Cambridge University, Exim versions prior to 4.70 Unix Any version Linux Any version |
Recommendation |
Upgrade to the latest exim package (4.70 or later), available from the Exim Internet Mailer Web site at http://www.exim.org/ |
Related URL |
CVE-2010-4344 (CVE) |
Related URL |
45308 (SecurityFocus) |
Related URL |
(ISS) |
|