Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gfq6-mjrf-7jp5

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.

Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.

EPSS

Процентиль: 82%
0.01752
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.

redhat
больше 20 лет назад

Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.

nvd
больше 20 лет назад

Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.

debian
больше 20 лет назад

Buffer overflow in the spa_base64_to_bits function in Exim before 4.43 ...

EPSS

Процентиль: 82%
0.01752
Низкий