Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-5671

Опубликовано: 31 окт. 2012
Источник: ubuntu
Приоритет: high
CVSS2: 6.8

Описание

Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.

РелизСтатусПримечание
devel

not-affected

4.80-3ubuntu1.1
hardy

not-affected

code not present
lucid

released

4.71-3ubuntu1.4
natty

released

4.74-1ubuntu1.3
oneiric

released

4.76-2ubuntu1.1
precise

released

4.76-3ubuntu3.1
quantal

released

4.80-3ubuntu1.1
upstream

needs-triage

Показывать по

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 13 лет назад

Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.

nvd
больше 13 лет назад

Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.

debian
больше 13 лет назад

Heap-based buffer overflow in the dkim_exim_query_dns_txt function in ...

github
больше 3 лет назад

Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.

6.8 Medium

CVSS2