Описание
Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
- ExploitPatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- ExploitPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.32 (включая)
cpe:2.3:a:university_of_cambridge:exim:*:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.06391
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
ubuntu
почти 21 год назад
Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
debian
почти 21 год назад
Stack-based buffer overflow in Exim 4 before 4.33, when the headers_ch ...
github
около 3 лет назад
Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
EPSS
Процентиль: 91%
0.06391
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other