Логотип exploitDog
bind: "CVE-2023-42116"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-42116"

Количество 9

Количество 9

ubuntu логотип

CVE-2023-42116

больше 1 года назад

Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17515.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2023-42116

почти 2 года назад

Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17515.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2023-42116

больше 1 года назад

Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17515.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2023-42116

больше 1 года назад

Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-5hxx-p89v-jxc7

больше 1 года назад

Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-17515.

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2023-06278

больше 3 лет назад

Уязвимость реализации протокола SMTP почтового сервера Exim, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2023:0293-1

почти 2 года назад

Security update for exim

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2024:0007-1

больше 1 года назад

Security update for exim

EPSS: Низкий
redos логотип

ROS-20240404-17

больше 1 года назад

Множественные уязвимости exim

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-42116

Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17515.

CVSS3: 9.8
4%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-42116

Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17515.

CVSS3: 8.1
4%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-42116

Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17515.

CVSS3: 9.8
4%
Низкий
больше 1 года назад
debian логотип
CVE-2023-42116

Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution ...

CVSS3: 9.8
4%
Низкий
больше 1 года назад
github логотип
GHSA-5hxx-p89v-jxc7

Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-17515.

CVSS3: 8.1
4%
Низкий
больше 1 года назад
fstec логотип
BDU:2023-06278

Уязвимость реализации протокола SMTP почтового сервера Exim, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
4%
Низкий
больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2023:0293-1

Security update for exim

почти 2 года назад
suse-cvrf логотип
openSUSE-SU-2024:0007-1

Security update for exim

больше 1 года назад
redos логотип
ROS-20240404-17

Множественные уязвимости exim

CVSS3: 9.8
больше 1 года назад

Уязвимостей на страницу