Page 7 of 57 results (0.017 seconds)

CVSS: 10.0EPSS: 97%CPEs: 4EXPL: 17

A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution. Se descubrió un defecto Exim versiones 4.87 a la 4.91 (incluida). Una validación incorrecta de la dirección del recipiente en la función deliver_message() en /src/deliver.c puede llevar a ejecutar comandos remotos Exim versions 4.87 through 4.91 suffer from a local privilege escalation vulnerability. Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution. • https://www.exploit-db.com/exploits/46996 https://www.exploit-db.com/exploits/47307 https://www.exploit-db.com/exploits/46974 https://github.com/cowbe0x004/eximrce-CVE-2019-10149 https://github.com/Diefunction/CVE-2019-10149 https://github.com/AzizMea/CVE-2019-10149-privilege-escalation https://github.com/darsigovrustam/CVE-2019-10149 https://github.com/aishee/CVE-2019-10149-quick https://github.com/hyim0810/CVE-2019-10149 https://github.com/Stick-U235/CVE-2019-10149-Exploit& • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 95%CPEs: 7EXPL: 4

An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely. Se ha descubierto un problema en la función base64d en el escuchador SMTP en Exim, en versiones anteriores a la 4.90.1. Al enviar un mensaje manipulado, podría ocurrir un desbordamiento de búfer. • https://www.exploit-db.com/exploits/45671 https://www.exploit-db.com/exploits/44571 https://github.com/synacktiv/Exim-CVE-2018-6789 https://github.com/beraphin/CVE-2018-6789 http://openwall.com/lists/oss-security/2018/02/10/2 http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html http://www.openwall.com/lists/oss-security/2018/02/07/2 http://www.securityfocus.com/bid/103049 http://www.securitytracker.com/id/1040461 https://devco.re/blog/201 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 52%CPEs: 3EXPL: 3

The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands. La función receive_msg en receive.c en el demonio SMTP en Exim 4.88 y 4.89 permite que atacantes remotos ejecuten código arbitrario o provoquen una denegación de servicio (uso de memoria previamente liberada) mediante vectores relacionados con comandos BDAT. • https://github.com/beraphin/CVE-2017-16943 http://openwall.com/lists/oss-security/2017/11/25/1 http://openwall.com/lists/oss-security/2017/11/25/2 http://openwall.com/lists/oss-security/2017/11/25/3 http://www.openwall.com/lists/oss-security/2021/05/04/7 http://www.securitytracker.com/id/1039872 https://bugs.exim.org/show_bug.cgi?id=2199 https://git.exim.org/exim.git/commit/4090d62a4b25782129cc1643596dc2f6e8f63bde https://git.exim.org/exim.git/commitdiff/4e6a • CWE-416: Use After Free •

CVSS: 7.5EPSS: 85%CPEs: 3EXPL: 2

The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function. La función receive_msg en receive.c en el demonio SMTP en Exim 4.88 y 4.89 permite que atacantes remotos provoquen una denegación de servicio (bucle infinito y agotamiento de pila) mediante vectores relacionados con comandos BDAT y una comprobación infinita para un carácter "." que implique el fin del contexto. Esto se relaciona con la función bdat_getc. Exim version 4.89 suffers from a denial of service vulnerability while parsing the BDAT data header. • https://www.exploit-db.com/exploits/43184 http://openwall.com/lists/oss-security/2017/11/25/1 http://openwall.com/lists/oss-security/2017/11/25/2 http://openwall.com/lists/oss-security/2017/11/25/3 http://www.openwall.com/lists/oss-security/2021/05/04/7 http://www.securitytracker.com/id/1039873 https://bugs.exim.org/show_bug.cgi?id=2201 https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html https://www.debian.org/security/2017/dsa- • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 4.0EPSS: 0%CPEs: 18EXPL: 0

Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time. Exim es compatible con el uso de múltiples argumentos de líneas de comandos \"-p\" en los que se emplea la función malloc() y nunca la función free(). Estos argumentos, junto con otros problemas permite que los atacantes provoquen la ejecución de código arbitrario. • http://www.debian.org/security/2017/dsa-3888 http://www.securityfocus.com/bid/99252 http://www.securitytracker.com/id/1038779 https://access.redhat.com/security/cve/CVE-2017-1000369 https://github.com/Exim/exim/commit/65e061b76867a9ea7aeeb535341b790b90ae6c21 https://security.gentoo.org/glsa/201709-19 https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt • CWE-404: Improper Resource Shutdown or Release •