Описание
Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| exim4 | fixed | 4.92~RC5-1 | package |
Примечания
Fixed by: https://git.exim.org/exim.git/commit/56ac062a3ff94fc4e1bbfc2293119c079a4e980b (exim-4.92-RC5)
https://www.openwall.com/lists/oss-security/2021/05/04/7
Связанные уязвимости
Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction.
Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction.
Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction.
Уязвимость функции receive_msg() агента пересылки сообщений Exim, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
Уязвимость функции pdkim_finish_bodyhash() агента пересылки сообщений Exim, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ конфиденциальной информации