Vulnerability Details

Exim 4.92 < 4.92.3 RCE Vulnerability

Published: 2019-07-29 06:24:44
CVE Author: NIST National Vulnerability Database

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Detection Type:
Remote Banner Unreliable

Solution Type:
Vendor Patch

Summary:
Exim is prone to an remote code execution vulnerability.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
There is a heap-based buffer overflow in string_vformat (string.c). The currently known exploit uses a extraordinary long EHLO string to crash the Exim process that is receiving the message. While at this mode of operation Exim already dropped its privileges, other paths to reach the vulnerable code may exist.

Impact:
A local or remote attacker can execute programs.

Affected Versions:
Exim version 4.92 up to and including 4.92.2.

Recommendations:
Update to version 4.92.3 or later.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-16928

CVE Analysis

https://www.mageni.net/cve/CVE-2019-16928

References:

https://exim.org/static/doc/security/CVE-2019-16928.txt

Severity
High
CVSS Score
10.0
Published
2019-07-29
Modified
2019-08-02
Category
General

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.